NIXPKGS-2026-0070 published on 21 Jan 2026 CVE-2026-0622 updated 1 day, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed package open5gs-webui 1 day, 10 hours ago @LeSuisse accepted as draft 1 day, 10 hours ago @LeSuisse published on GitHub 1 day, 10 hours ago Open 5GS WebUI uses a hard-coded JWT signing key Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset Affected products open5GS =<2.7.6 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com> Permalink GitHub issue
CVE-2026-0622 updated 1 day, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed package open5gs-webui 1 day, 10 hours ago @LeSuisse accepted as draft 1 day, 10 hours ago @LeSuisse published on GitHub 1 day, 10 hours ago Open 5GS WebUI uses a hard-coded JWT signing key Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset Affected products open5GS =<2.7.6 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com>
pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2
NIXPKGS-2026-0071 published on 21 Jan 2026 CVE-2026-22045 updated 1 day, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed package traefik-certs-dumper 1 day, 10 hours ago @LeSuisse removed maintainer @NickCao 1 day, 10 hours ago @LeSuisse accepted as draft 1 day, 10 hours ago @LeSuisse published on GitHub 1 day, 10 hours ago Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up go routines and file descriptors indefinitely when the ACME TLS challenge is enabled. A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entry point. The vulnerability is fixed in 2.11.35 and 3.6.7. Affected products traefik ==>=3.0.0-beta1, < 3.6.7 ==< 2.11.35 Matching in nixpkgs pkgs.traefik Modern reverse proxy nixos-unstable 3.6.1 nixpkgs-unstable 3.6.1 nixos-unstable-small 3.6.2 nixos-25.05 3.3.6 nixos-25.05-small 3.3.6 nixpkgs-25.05-darwin 3.3.6 Package maintainers: 2 @djds djds <git@djds.dev> @vdemeester Vincent Demeester <vincent@sbr.pm> Permalink GitHub issue
CVE-2026-22045 updated 1 day, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed package traefik-certs-dumper 1 day, 10 hours ago @LeSuisse removed maintainer @NickCao 1 day, 10 hours ago @LeSuisse accepted as draft 1 day, 10 hours ago @LeSuisse published on GitHub 1 day, 10 hours ago Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up go routines and file descriptors indefinitely when the ACME TLS challenge is enabled. A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entry point. The vulnerability is fixed in 2.11.35 and 3.6.7. Affected products traefik ==>=3.0.0-beta1, < 3.6.7 ==< 2.11.35 Matching in nixpkgs pkgs.traefik Modern reverse proxy nixos-unstable 3.6.1 nixpkgs-unstable 3.6.1 nixos-unstable-small 3.6.2 nixos-25.05 3.3.6 nixos-25.05-small 3.3.6 nixpkgs-25.05-darwin 3.3.6 Package maintainers: 2 @djds djds <git@djds.dev> @vdemeester Vincent Demeester <vincent@sbr.pm>
pkgs.traefik Modern reverse proxy nixos-unstable 3.6.1 nixpkgs-unstable 3.6.1 nixos-unstable-small 3.6.2 nixos-25.05 3.3.6 nixos-25.05-small 3.3.6 nixpkgs-25.05-darwin 3.3.6
NIXPKGS-2026-0065 published on 21 Jan 2026 CVE-2025-15539 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed package open5gs-webui 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed. Affected products Open5GS ==2.7.6 ==2.7.4 ==2.7.5 ==2.7.2 ==2.7.1 ==2.7.3 ==2.7.0 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com> Permalink GitHub issue
CVE-2025-15539 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed package open5gs-webui 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed. Affected products Open5GS ==2.7.6 ==2.7.4 ==2.7.5 ==2.7.2 ==2.7.1 ==2.7.3 ==2.7.0 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com>
pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2
NIXPKGS-2026-0066 published on 21 Jan 2026 CVE-2025-15536 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed 2 packages python312Packages.opencc python313Packages.opencc 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 23 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago BYVoid OpenCC MaxMatchSegmentation.cpp MaxMatchSegmentation heap-based overflow A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch. Affected products OpenCC ==1.1.9 ==1.1.6 ==1.1.8 ==1.1.5 ==1.1.7 ==1.1.2 ==1.1.0 ==1.1.1 ==1.1.4 ==1.1.3 Matching in nixpkgs pkgs.opencc Project for conversion between Traditional and Simplified Chinese nixos-unstable 1.1.9 nixpkgs-unstable 1.1.9 nixos-unstable-small 1.1.9 nixos-25.05 1.1.9 nixos-25.05-small 1.1.9 nixpkgs-25.05-darwin 1.1.9 Package maintainers: 2 @sifmelcara Ming Chuan <ming@culpring.com> @siraben Siraphob Phipathananunth <bensiraphob@gmail.com> Permalink GitHub issue
CVE-2025-15536 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed 2 packages python312Packages.opencc python313Packages.opencc 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 23 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago BYVoid OpenCC MaxMatchSegmentation.cpp MaxMatchSegmentation heap-based overflow A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch. Affected products OpenCC ==1.1.9 ==1.1.6 ==1.1.8 ==1.1.5 ==1.1.7 ==1.1.2 ==1.1.0 ==1.1.1 ==1.1.4 ==1.1.3 Matching in nixpkgs pkgs.opencc Project for conversion between Traditional and Simplified Chinese nixos-unstable 1.1.9 nixpkgs-unstable 1.1.9 nixos-unstable-small 1.1.9 nixos-25.05 1.1.9 nixos-25.05-small 1.1.9 nixpkgs-25.05-darwin 1.1.9 Package maintainers: 2 @sifmelcara Ming Chuan <ming@culpring.com> @siraben Siraphob Phipathananunth <bensiraphob@gmail.com>
pkgs.opencc Project for conversion between Traditional and Simplified Chinese nixos-unstable 1.1.9 nixpkgs-unstable 1.1.9 nixos-unstable-small 1.1.9 nixos-25.05 1.1.9 nixos-25.05-small 1.1.9 nixpkgs-25.05-darwin 1.1.9
NIXPKGS-2026-0066 published on 21 Jan 2026 CVE-2025-15529 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 15 hours ago @LeSuisse removed package open5gs-webui 5 days, 2 hours ago @LeSuisse accepted as draft 5 days, 2 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch. Affected products Open5GS ==2.7.1 ==2.7.0 ==2.7.3 ==2.7.4 ==2.7.6 ==2.7.2 ==2.7.5 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com> Permalink GitHub issue
CVE-2025-15529 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 15 hours ago @LeSuisse removed package open5gs-webui 5 days, 2 hours ago @LeSuisse accepted as draft 5 days, 2 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch. Affected products Open5GS ==2.7.1 ==2.7.0 ==2.7.3 ==2.7.4 ==2.7.6 ==2.7.2 ==2.7.5 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com>
pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2
NIXPKGS-2026-0067 published on 21 Jan 2026 CVE-2025-15528 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 15 hours ago @LeSuisse removed package open5gs-webui 5 days, 2 hours ago @LeSuisse accepted as draft 5 days, 2 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS GTPv2 Bearer Response denial of service A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue. Affected products Open5GS ==2.7.6 ==2.7.4 ==2.7.5 ==2.7.2 ==2.7.3 ==2.7.1 ==2.7.0 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com> Permalink GitHub issue
CVE-2025-15528 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 15 hours ago @LeSuisse removed package open5gs-webui 5 days, 2 hours ago @LeSuisse accepted as draft 5 days, 2 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Open5GS GTPv2 Bearer Response denial of service A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue. Affected products Open5GS ==2.7.6 ==2.7.4 ==2.7.5 ==2.7.2 ==2.7.3 ==2.7.1 ==2.7.0 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com>
pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2
NIXPKGS-2026-0064 published on 21 Jan 2026 CVE-2026-1144 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 15 hours ago @LeSuisse removed 4 packages python312Packages.quickjs python313Packages.quickjs python312Packages.llm-tools-quickjs python313Packages.llm-tools-quickjs 2 days, 9 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago quickjs-ng quickjs Atomics Ops quickjs.c use after free A vulnerability was detected in quickjs-ng quickjs up to 0.11.0. Affected is an unknown function of the file quickjs.c of the component Atomics Ops Handler. The manipulation results in use after free. The attack can be executed remotely. The exploit is now public and may be used. The patch is identified as ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141. Applying a patch is advised to resolve this issue. Affected products quickjs ==0.10 ==0.1 ==0.7 ==0.8 ==0.2 ==0.4 ==0.11.0 ==0.9 ==0.3 ==0.5 ==0.6 Matching in nixpkgs pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13 pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0 Package maintainers: 2 @stesie Stefan Siegl <stesie@brokenpipe.de> @philiptaron Philip Taron <philip.taron@gmail.com> Permalink GitHub issue
CVE-2026-1144 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 15 hours ago @LeSuisse removed 4 packages python312Packages.quickjs python313Packages.quickjs python312Packages.llm-tools-quickjs python313Packages.llm-tools-quickjs 2 days, 9 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago quickjs-ng quickjs Atomics Ops quickjs.c use after free A vulnerability was detected in quickjs-ng quickjs up to 0.11.0. Affected is an unknown function of the file quickjs.c of the component Atomics Ops Handler. The manipulation results in use after free. The attack can be executed remotely. The exploit is now public and may be used. The patch is identified as ea3e9d77454e8fc9cb3ef3c504e9c16af5a80141. Applying a patch is advised to resolve this issue. Affected products quickjs ==0.10 ==0.1 ==0.7 ==0.8 ==0.2 ==0.4 ==0.11.0 ==0.9 ==0.3 ==0.5 ==0.6 Matching in nixpkgs pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13 pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0 Package maintainers: 2 @stesie Stefan Siegl <stesie@brokenpipe.de> @philiptaron Philip Taron <philip.taron@gmail.com>
pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13
pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0
NIXPKGS-2026-0063 published on 21 Jan 2026 CVE-2026-1145 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 15 hours ago @LeSuisse removed 4 packages python312Packages.quickjs python313Packages.quickjs python312Packages.llm-tools-quickjs python313Packages.llm-tools-quickjs 2 days, 9 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago quickjs-ng quickjs quickjs.c js_typed_array_constructor_ta heap-based overflow A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue. Affected products quickjs ==0.10 ==0.1 ==0.7 ==0.8 ==0.2 ==0.4 ==0.6 ==0.9 ==0.3 ==0.5 ==0.11.0 Matching in nixpkgs pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13 pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0 Package maintainers: 2 @stesie Stefan Siegl <stesie@brokenpipe.de> @philiptaron Philip Taron <philip.taron@gmail.com> Permalink GitHub issue
CVE-2026-1145 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 15 hours ago @LeSuisse removed 4 packages python312Packages.quickjs python313Packages.quickjs python312Packages.llm-tools-quickjs python313Packages.llm-tools-quickjs 2 days, 9 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago quickjs-ng quickjs quickjs.c js_typed_array_constructor_ta heap-based overflow A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue. Affected products quickjs ==0.10 ==0.1 ==0.7 ==0.8 ==0.2 ==0.4 ==0.6 ==0.9 ==0.3 ==0.5 ==0.11.0 Matching in nixpkgs pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13 pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0 Package maintainers: 2 @stesie Stefan Siegl <stesie@brokenpipe.de> @philiptaron Philip Taron <philip.taron@gmail.com>
pkgs.quickjs Small and embeddable Javascript engine nixos-unstable 2025-09-13-2 nixpkgs-unstable 2025-09-13-2 nixos-unstable-small 2025-09-13-2 nixos-25.05 2024-01-13 nixos-25.05-small 2024-01-13 nixpkgs-25.05-darwin 2024-01-13
pkgs.quickjs-ng Mighty JavaScript engine nixos-unstable 0.11.0 nixpkgs-unstable 0.11.0 nixos-unstable-small 0.11.0 nixos-25.05 0.10.0 nixos-25.05-small 0.10.0 nixpkgs-25.05-darwin 0.10.0
NIXPKGS-2026-0066 published on 21 Jan 2026 CVE-2025-15537 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed 2 packages python312Packages.python-mapnik python313Packages.python-mapnik 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Mapnik dbfile.cpp string_value heap-based overflow A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. Affected products Mapnik ==4.1 ==4.2.0 ==4.0 Matching in nixpkgs pkgs.mapnik Open source toolkit for developing mapping applications nixos-unstable 4.1.4 nixpkgs-unstable 4.1.4 nixos-unstable-small 4.1.4 nixos-25.05 4.0.7 nixos-25.05-small 4.0.7 nixpkgs-25.05-darwin 4.0.7 Package maintainers: 9 @autra Augustin Trancart <augustin.trancart@gmail.com> @hummeltech David Hummel <hummeltech@sherpaguru.com> @willcohen Will Cohen @l0b0 Victor Engmark <victor@engmark.name> @nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com> @imincik Ivan Mincik <ivan.mincik@gmail.com> @sikmir Nikolay Korotkiy <sikmir@disroot.org> @hrdinka Christoph Hrdinka <c.nix@hrdinka.at> @nh2 Niklas Hambüchen <mail@nh2.me> Permalink GitHub issue
CVE-2025-15537 updated 1 day, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 3 days, 15 hours ago @LeSuisse removed 2 packages python312Packages.python-mapnik python313Packages.python-mapnik 2 days, 23 hours ago @LeSuisse accepted as draft 2 days, 9 hours ago @LeSuisse published on GitHub 1 day, 11 hours ago Mapnik dbfile.cpp string_value heap-based overflow A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. Affected products Mapnik ==4.1 ==4.2.0 ==4.0 Matching in nixpkgs pkgs.mapnik Open source toolkit for developing mapping applications nixos-unstable 4.1.4 nixpkgs-unstable 4.1.4 nixos-unstable-small 4.1.4 nixos-25.05 4.0.7 nixos-25.05-small 4.0.7 nixpkgs-25.05-darwin 4.0.7 Package maintainers: 9 @autra Augustin Trancart <augustin.trancart@gmail.com> @hummeltech David Hummel <hummeltech@sherpaguru.com> @willcohen Will Cohen @l0b0 Victor Engmark <victor@engmark.name> @nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com> @imincik Ivan Mincik <ivan.mincik@gmail.com> @sikmir Nikolay Korotkiy <sikmir@disroot.org> @hrdinka Christoph Hrdinka <c.nix@hrdinka.at> @nh2 Niklas Hambüchen <mail@nh2.me>
pkgs.mapnik Open source toolkit for developing mapping applications nixos-unstable 4.1.4 nixpkgs-unstable 4.1.4 nixos-unstable-small 4.1.4 nixos-25.05 4.0.7 nixos-25.05-small 4.0.7 nixpkgs-25.05-darwin 4.0.7
NIXPKGS-2026-0072 published on 21 Jan 2026 CVE-2025-15281 updated 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed 24 packages getconf mtrace locale getent iconv libc libiconv glibcInfo glibc_multi glibc_memusage glibcLocales glibcLocalesUtf8 unixtools.getent tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp unixtools.getconf unixtools.locale 22 hours ago @LeSuisse accepted as draft 22 hours ago @LeSuisse published on GitHub 22 hours ago wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process. Affected products glibc =<2.42 Matching in nixpkgs pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> Permalink GitHub issue
CVE-2025-15281 updated 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 day, 15 hours ago @LeSuisse removed 24 packages getconf mtrace locale getent iconv libc libiconv glibcInfo glibc_multi glibc_memusage glibcLocales glibcLocalesUtf8 unixtools.getent tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp unixtools.getconf unixtools.locale 22 hours ago @LeSuisse accepted as draft 22 hours ago @LeSuisse published on GitHub 22 hours ago wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process. Affected products glibc =<2.42 Matching in nixpkgs pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me>
pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66