Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0627
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • openssh_hpn
    • opensshTest
    • openssh
    • openssh-askpass
    • opensshWithKerberos
    • openssh_hpnWithKerberos
    • perlPackages.NetOpenSSH
    • perl5Packages.NetOpenSSH
    • lxqt.lxqt-openssh-askpass
    • perl538Packages.NetOpenSSH
    • perl540Packages.NetOpenSSH
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Vulnerability in the OpenSSH GSSAPI delta included in various Linux …

Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.

Affected products

openssh
  • <1:9.6p1-3ubuntu13.15
  • <1:8.9p1-3ubuntu0.14
  • <1:10.0p1-5ubuntu5.1

Matching in nixpkgs

Ignored packages (11)
Patch and OSS Sec advisory: https://www.openwall.com/lists/oss-security/2026/03/12/3
NIXPKGS-2026-0628
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • wormhole-rs
    • magic-wormhole-rs
    • python312Packages.magic-wormhole
    • python313Packages.magic-wormhole
    • python314Packages.magic-wormhole
    • python312Packages.magic-wormhole-transit-relay
    • python313Packages.magic-wormhole-transit-relay
    • python314Packages.magic-wormhole-transit-relay
    • python312Packages.magic-wormhole-mailbox-server
    • python313Packages.magic-wormhole-mailbox-server
    • python314Packages.magic-wormhole-mailbox-server
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Magic Wormhole: "wormhole receive" allows arbitrary local file overwrite

Magic Wormhole makes it possible to get arbitrary-sized files and directories from one computer to another. From 0.21.0 to before 0.23.0, receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs wormhole send) can mount the attack. Other parties (including the transit/relay servers) are excluded by the wormhole protocol. This vulnerability is fixed in 0.23.0.

Affected products

magic-wormhole
  • ==>= 0.21.0, < 0.23.0

Matching in nixpkgs

Ignored packages (11)

Package maintainers

Upstream advisory: https://github.com/magic-wormhole/magic-wormhole/security/advisories/GHSA-4g4c-mfqg-pj8r
NIXPKGS-2026-0629
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • capnproto-java
    • capnproto-rust
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cap'n Proto has an integer overflow in KJ-HTTP

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, a negative Content-Length value was converted to unsigned, treating it as an impossibly large length instead. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Affected products

capnproto
  • ==< 1.4.0

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Upstream advisory: https://github.com/capnproto/capnproto/security/advisories/GHSA-qjx3-pp3m-9jpm
NIXPKGS-2026-0631
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenClaw: Untrusted web origins can obtain authenticated operator.admin access in trusted-proxy mode

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. This vulnerability is fixed in 2026.3.11.

Affected products

openclaw
  • ==< 2026.3.11

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/openclaw/openclaw/security/advisories/GHSA-5wcw-8jjv-m286
NIXPKGS-2026-0626
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • capnproto-java
    • capnproto-rust
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cap'n Proto: Integer overflow in KJ-HTTP chunk size

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Affected products

capnproto
  • ==< 1.4.0

Matching in nixpkgs

Ignored packages (2)

Package maintainers

Upstream advisory: https://github.com/capnproto/capnproto/security/advisories/GHSA-vpcq-mx5v-32wm
NIXPKGS-2026-0630
published on 13 Mar 2026
updated 1 day, 12 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    15 packages
    • speech-denoiser
    • openimagedenoise
    • terraform-providers.deno
    • python312Packages.denonavr
    • python313Packages.denonavr
    • haskellPackages.pandoc-sidenote
    • terraform-providers.denoland_deno
    • gnomeExtensions.denon-avr-controler
    • python312Packages.bnunicodenormalizer
    • python313Packages.bnunicodenormalizer
    • python314Packages.bnunicodenormalizer
    • vscode-extensions.denoland.vscode-deno
    • home-assistant-component-tests.denonavr
    • tests.home-assistant-component-tests.denonavr
    • gnomeExtensions.marantz-and-denon-avr-controller
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Command Injection via incomplete shell metacharacter blocklist in node:child_process (bypass of CVE-2026-27190 fix)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument sanitization in transformDenoShellCommand (ext/node/polyfills/internal/child_process.ts) has a priority bug: when an argument contains a $VAR pattern, it is wrapped in double quotes (L1290) instead of single quotes. Double quotes in POSIX sh do not suppress backtick command substitution, allowing injected commands to execute. An attacker who controls arguments passed to spawnSync or spawn with shell: true can execute arbitrary OS commands, bypassing Deno's permission system. This vulnerability is fixed in 2.7.2.

Affected products

deno
  • ==>= 2.7.0, < 2.7.2

Matching in nixpkgs

Ignored packages (15)

Package maintainers

Upstream advisory: https://github.com/denoland/deno/security/advisories/GHSA-4c96-w8v2-p28j
NIXPKGS-2026-0592
published on 11 Mar 2026
updated 3 days, 17 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • imagemagick6Big
    • imagemagick6
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a heap buffer over-read via 32-bit integer overflow in MAT decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-mrmj-x24c-wwcv
NIXPKGS-2026-0587
published on 11 Mar 2026
updated 3 days, 18 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    11 packages
    • opa-envoy-plugin
    • python312Packages.envoy-utils
    • python313Packages.envoy-utils
    • python314Packages.envoy-utils
    • python312Packages.envoy-reader
    • python313Packages.envoy-reader
    • python314Packages.envoy-reader
    • python313Packages.envoy-data-plane
    • python314Packages.envoy-data-plane
    • home-assistant-component-tests.enphase_envoy
    • tests.home-assistant-component-tests.enphase_envoy
  • @mweinelt accepted
  • @mweinelt published on GitHub
Crash for scoped ip address in Envoy during DNS

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

Affected products

envoy
  • ==>= 1.35.0, < 1.35.9
  • ==>= 1.36.0, < 1.36.5
  • ==>= 1.37.0, < 1.37.1
  • ==< 1.34.13

Matching in nixpkgs

Ignored packages (11)

Package maintainers

https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p
NIXPKGS-2026-0602
published on 11 Mar 2026
updated 3 days, 17 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Path Policy TOCTOU symlink race bypass

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-493f-jh8w-qhx3
NIXPKGS-2026-0612
published on 11 Mar 2026
updated 3 days, 17 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
SiYuan has a Path Traversal in /export Endpoint Allows Arbitrary File Read and Secret Leakage

SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.

Affected products

siyuan
  • ==< 3.5.10

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

https://github.com/siyuan-note/siyuan/security/advisories/GHSA-2h2p-mvfx-868w