Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0028
published on
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed maintainer @peterhoeg
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-buffer-overflow in drive_process_irp_read

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0037
published on
Permalink CVE-2025-62394
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: quiz notifications sent to suspended participants

Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information.

References

Affected products

moodle
  • <5.0.3
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0036
published on
Permalink CVE-2025-62401
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: possible to bypass timer in timed assignments

An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.

References

Affected products

moodle
  • <4.4.11
  • <5.0.3
  • <4.1.21
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0035
published on
Permalink CVE-2025-11731
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.libxslt
  • @LeSuisse removed package python313Packages.libxslt
  • @LeSuisse removed maintainer @jtojnar
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxslt: type confusion in exsltfuncresultcompfunction of libxslt

A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.

Affected products

rhcos
libxslt
  • <1.1.44

Matching in nixpkgs

pkgs.libxslt

C library and tools to do XSL transformations

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0034
published on
Permalink CVE-2025-12105
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
  • @LeSuisse removed package libsoup_2_4
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: heap use-after-free in libsoup message queue handling during http/2 read completion

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.

References

Affected products

libsoup
  • =<3.6.5
libsoup3
  • *

Matching in nixpkgs

pkgs.libsoup_3

HTTP client/server library for GNOME

Package maintainers

Upstream fix: https://gitlab.gnome.org/GNOME/libsoup/-/commit/9ba1243a24e442fa5ec44684617a4480027da960
NIXPKGS-2026-0032
published on
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package github-distributed-owners
  • @LeSuisse removed package haskellPackages.distributed-fork
  • @LeSuisse removed package haskellPackages.aivika-distributed
  • @LeSuisse removed package haskellPackages.distributed-static
  • @LeSuisse removed package haskellPackages.distributed-closure
  • @LeSuisse removed package haskellPackages.distributed-process
  • @LeSuisse removed package haskellPackages.powerqueue-distributed
  • @LeSuisse removed package haskellPackages.distributed-process-ekg
  • @LeSuisse removed package haskellPackages.distributed-process-async
  • @LeSuisse removed package haskellPackages.distributed-process-tests
  • @LeSuisse removed package haskellPackages.distributed-process-extras
  • @LeSuisse removed package haskellPackages.distributed-process-systest
  • @LeSuisse removed package haskellPackages.distributed-process-execution
  • @LeSuisse removed package haskellPackages.distributed-process-supervisor
  • @LeSuisse removed package haskellPackages.distributed-process-client-server
  • @LeSuisse removed package haskellPackages.distributed-process-monad-control
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Dask distributed Vulnerable to Remote Code Execution via Jupyter Proxy and Dashboard

Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0.

Affected products

distributed
  • ==< 2026.1.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/dask/distributed/security/advisories/GHSA-c336-7962-wfj2
Upstream fix: https://github.com/dask/distributed/commit/ab72092a8a938923c2bb51a2cd14ca26614827fa
NIXPKGS-2026-0030
published on
Permalink CVE-2025-62395
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: external cohort search service leaks system cohort data

A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data.

References

Affected products

moodle
  • <4.4.11
  • <5.0.3
  • <4.1.21
  • <4.5.7

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0026
published on
Permalink CVE-2026-0915
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package iconv
  • @LeSuisse removed package getent
  • @LeSuisse removed package locale
  • @LeSuisse removed package libc
  • @LeSuisse removed package mtrace
  • @LeSuisse removed package getconf
  • @LeSuisse removed package libiconv
  • @LeSuisse removed package glibcInfo
  • @LeSuisse removed package glibc_multi
  • @LeSuisse removed package glibcLocales
  • @LeSuisse removed package glibc_memusage
  • @LeSuisse removed package glibcLocalesUtf8
  • @LeSuisse removed package unixtools.getent
  • @LeSuisse removed package unixtools.locale
  • @LeSuisse removed package unixtools.getconf
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
  • @LeSuisse removed package tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
  • @LeSuisse removed package tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

Affected products

glibc
  • =<2.42

Matching in nixpkgs

Package maintainers

Upstream advisory: https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0002;hb=HEAD
NIXPKGS-2026-0025
published on
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SiYuan Vulnerable to Stored Cross-Site Scripting (XSS) via Unrestricted SVG File Upload

SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session. This vulnerability is fixed in 3.5.4-dev2.

Affected products

siyuan
  • ==< 3.5.4-dev2

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

Upstream advisory: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-pcjq-j3mq-jv5j
Upstream patch: https://github.com/siyuan-note/siyuan/commit/11115da3d0de950593ee4ce375cf7f9018484388
NIXPKGS-2026-0020
published on
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-buffer-overflow in audin_process_formats

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9chc-g79v-4qq4