Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0532
published on 7 Mar 2026
updated 9 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
OliveTin: RestartAction always runs actions as guest

OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, an authentication context confusion vulnerability in RestartAction allows a low‑privileged authenticated user to execute actions they are not permitted to run. RestartAction constructs a new internal connect.Request without preserving the original caller’s authentication headers or cookies. When this synthetic request is passed to StartAction, the authentication resolver falls back to the guest user. If the guest account has broader permissions than the authenticated caller, this results in privilege escalation and unauthorized command execution. This vulnerability allows a low‑privileged authenticated user to bypass ACL restrictions and execute arbitrary configured shell actions. This issue has been patched in version 3000.11.1.

Affected products

OliveTin
  • ==< 3000.11.1

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0561
published on 7 Mar 2026
updated 6 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    28 packages
    • langgraph-cli
    • python312Packages.langgraph-cli
    • python312Packages.langgraph-sdk
    • python313Packages.langgraph-cli
    • python313Packages.langgraph-sdk
    • python314Packages.langgraph-cli
    • python314Packages.langgraph-sdk
    • python312Packages.langgraph-prebuilt
    • python313Packages.langgraph-prebuilt
    • python314Packages.langgraph-prebuilt
    • python312Packages.langgraph-checkpoint
    • python313Packages.langgraph-checkpoint
    • python314Packages.langgraph-checkpoint
    • python312Packages.langgraph-runtime-inmem
    • python312Packages.langgraph-store-mongodb
    • python313Packages.langgraph-runtime-inmem
    • python313Packages.langgraph-store-mongodb
    • python314Packages.langgraph-runtime-inmem
    • python314Packages.langgraph-store-mongodb
    • python312Packages.langgraph-checkpoint-sqlite
    • python313Packages.langgraph-checkpoint-sqlite
    • python314Packages.langgraph-checkpoint-sqlite
    • python312Packages.langgraph-checkpoint-mongodb
    • python313Packages.langgraph-checkpoint-mongodb
    • python314Packages.langgraph-checkpoint-mongodb
    • python312Packages.langgraph-checkpoint-postgres
    • python313Packages.langgraph-checkpoint-postgres
    • python314Packages.langgraph-checkpoint-postgres
  • @mweinelt accepted
  • @mweinelt published on GitHub
LangGraph: Unsafe msgpack deserialization in LangGraph checkpoint loading

LangGraph SQLite Checkpoint is an implementation of LangGraph CheckpointSaver that uses SQLite DB (both sync and async, via aiosqlite). In version 1.0.9 and prior, LangGraph checkpointers can load msgpack-encoded checkpoints that reconstruct Python objects during deserialization. If an attacker can modify checkpoint data in the backing store (for example, after a database compromise or other privileged write access to the persistence layer), they can potentially supply a crafted payload that triggers unsafe object reconstruction when the checkpoint is loaded. No known patch is public.

Affected products

langgraph
  • ==<= 1.0.9

Matching in nixpkgs

Ignored packages (28)

Package maintainers

https://github.com/langchain-ai/langgraph/security/advisories/GHSA-g48c-2wqr-h844
NIXPKGS-2026-0541
published on 7 Mar 2026
updated 8 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Windmill: SUPERADMIN_SECRET (rarely used) can be accessed publicly

Windmill is an open-source developer platform for internal code: APIs, background jobs, workflows and UIs. Prior to version 1.603.3, an unauthenticated path traversal vulnerability exists in Windmill's get_log_file endpoint "(/api/w/{workspace}/jobs_u/get_log_file/{filename})". The filename parameter is concatenated into a file path without sanitization, allowing an attacker to read arbitrary files on the server using ../ sequences. This issue has been patched in version 1.603.3.

Affected products

windmill
  • ==< 1.603.3

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0527
published on 7 Mar 2026
updated 9 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
dbt-common: commonprefix() doesn't protect against path traversal

dbt-common is the shared common utilities for dbt-core and adapter implementations use. Prior to versions 1.34.2 and 1.37.3, a path traversal vulnerability exists in dbt-common's safe_extract() function used when extracting tarball archives. The function uses os.path.commonprefix() to validate that extracted files remain within the intended destination directory. However, commonprefix() compares paths character-by-character rather than by path components, allowing a malicious tarball to write files to sibling directories with matching name prefixes. This issue has been patched in versions 1.34.2 and 1.37.3.

Affected products

dbt-common
  • ==< 1.37.3
  • ==< 1.34.2

Matching in nixpkgs

NIXPKGS-2026-0556
published on 7 Mar 2026
updated 7 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
OliveTin: Unauthenticated DoS via concurrent map writes in OAuth2 state handling

OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsynchronized access to a shared registeredStates map, causing a Go runtime panic (fatal error: concurrent map writes) and process termination. This allows remote attackers to crash the service when OAuth2 is enabled. This issue has been patched in version 3000.10.3.

Affected products

OliveTin
  • ==< 3000.10.3

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0551
published on 7 Mar 2026
updated 7 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Gokapi: Privilege escalation via incomplete API-key permission revocation on user rank demotion

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, a privilege escalation vulnerability in the user rank demotion logic allows a demoted user's existing API keys to retain ApiPermManageFileRequests and ApiPermManageLogs permissions, enabling continued access to upload-request management and log viewing endpoints after the user has been stripped of all privileges. This issue has been patched in version 2.2.3.

Affected products

Gokapi
  • ==< 2.2.3

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0531
published on 7 Mar 2026
updated 9 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Gokapi: Data Leak in Upload Status Stream

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the upload status SSE implementation on /uploadStatus publishes global upload state to any authenticated listener and includes file_id values that are not scoped to the requesting user. This issue has been patched in version 2.2.3.

Affected products

Gokapi
  • ==< 2.2.3

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0536
published on 7 Mar 2026
updated 8 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Gokapi: CSRF in Login Endpoint

Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, the login flow accepts credential-bearing requests without CSRF protection mechanisms tied to the browser session context. The handler parses form values directly and creates a session on successful credential validation. This issue has been patched in version 2.2.3.

Affected products

Gokapi
  • ==< 2.2.3

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0546
published on 7 Mar 2026
updated 8 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    17 packages
    • timescaledb-tune
    • timescaledb-parallel-copy
    • postgresql14Packages.timescaledb
    • postgresql15Packages.timescaledb
    • postgresql16Packages.timescaledb
    • postgresql17Packages.timescaledb
    • postgresql18Packages.timescaledb
    • postgresqlPackages.timescaledb-apache
    • postgresqlPackages.timescaledb_toolkit
    • postgresql14Packages.timescaledb-apache
    • postgresql15Packages.timescaledb-apache
    • postgresql16Packages.timescaledb-apache
    • postgresql17Packages.timescaledb-apache
    • postgresql18Packages.timescaledb-apache
    • postgresql15Packages.timescaledb_toolkit
    • postgresql16Packages.timescaledb_toolkit
    • postgresql17Packages.timescaledb_toolkit
  • @mweinelt accepted
  • @mweinelt published on GitHub
TimescaleDB uses untrusted search path during extension upgrade

TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, operators). If the search_path includes user-writable schemas a malicious user can create functions in that schema that shadow builtin postgres functions and will be called instead of the postgres functions leading to arbitrary code execution during extension upgrade. This issue has been patched in version 2.25.2.

Affected products

timescaledb
  • ==>= 2.23.0, < 2.25.2

Matching in nixpkgs

Ignored packages (17)

Package maintainers

NixOS Unstable fixed in https://github.com/NixOS/nixpkgs/pull/496218
NIXPKGS-2026-0537
published on 7 Mar 2026
updated 8 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    10 packages
    • capypdf
    • python312Packages.pypdf2
    • python312Packages.pypdf3
    • python313Packages.pypdf2
    • python313Packages.pypdf3
    • python314Packages.pypdf2
    • python314Packages.pypdf3
    • python312Packages.pypdfium2
    • python313Packages.pypdfium2
    • python314Packages.pypdfium2
  • @mweinelt accepted
  • @mweinelt published on GitHub
pypdf: Inefficient decoding of ASCIIHexDecode streams

pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5.

Affected products

pypdf
  • ==< 6.7.5

Matching in nixpkgs

Ignored packages (10)

Package maintainers