Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0139
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Lute has a Stored Cross-Site Scripting (XSS) via Markdown hyperlink

Lute is a structured Markdown engine supporting Go and JavaScript. Lute 1.7.6 and earlier (as used in SiYuan before) has a Stored Cross-Site Scripting (XSS) vulnerability in the Markdown rendering engine. An attacker can inject malicious JavaScript into a Markdown text/note. When another user clicks the rendered content, the script executes in the context of their session.

Affected products

siyuan
  • ==< 3.5.5

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

Upstream advisory: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-rw25-98wq-76qv
NIXPKGS-2026-0144
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Trilium Notes has a Timing Attack Vulnerability in /api/login/sync

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. Prior to 0.101.0, a critical timing attack vulnerability in Trilium's sync authentication endpoint allows unauthenticated remote attackers to recover HMAC authentication hashes byte-by-byte through statistical timing analysis. This enables complete authentication bypass without password knowledge, granting full read/write access to victim's knowledge base. This vulnerability is fixed in 0.101.0.

Affected products

Trilium
  • ==< 0.101.0

Matching in nixpkgs

pkgs.trilium-desktop

Hierarchical note taking application with focus on building large personal knowledge bases

Package maintainers

Upstream advisory: https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hxf6-58cx-qq3x
Upstream PR: https://github.com/TriliumNext/Trilium/pull/8129
NIXPKGS-2026-0166
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Suricata eve/alert: http1 xff handling can lead to denial of service

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, various inefficiencies in xff handling, especially for alerts not triggered in a tx, can lead to severe slowdowns. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, disable XFF support in the eve configuration. The setting is disabled by default.

Affected products

suricata
  • ==< 7.0.14
  • ==>= 8.0.0, < 8.0.3

Matching in nixpkgs

pkgs.suricata

Free and open source, mature, fast and robust network threat detection engine

Package maintainers

Upstream advisory: https://github.com/OISF/suricata/security/advisories/GHSA-5jvg-5j3p-34cf
NIXPKGS-2026-0153
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-ldap
    • asterisk-module-sccp
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can allow an attacker to trigger XML External Entity (XXE) or XInclude-based local file disclosure, potentially exposing sensitive files from the host system. This can also be triggered in other cases in which the user is able to supply input in xml format that triggers the asterisk process to parse it. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42
NIXPKGS-2026-0164
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Suricata dnp3: unbounded transaction growth

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).

Affected products

suricata
  • ==< 7.0.14
  • ==>= 8.0.0, < 8.0.3

Matching in nixpkgs

pkgs.suricata

Free and open source, mature, fast and robust network threat detection engine

Package maintainers

Upstream advisory: https://github.com/OISF/suricata/security/advisories/GHSA-878h-2x6v-84q9
NIXPKGS-2026-0168
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • curaPlugins.octoprint
    • python312Packages.pyoctoprintapi
    • python313Packages.pyoctoprintapi
    • home-assistant-component-tests.octoprint
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OctoPrint has Timing Side-Channel Vulnerability in API Key Authentication

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up to and including 1.11.5 are affected by a (theoretical) timing attack vulnerability that allows API key extraction over the network. Due to using character based comparison that short-circuits on the first mismatched character during API key validation, rather than a cryptographical method with static runtime regardless of the point of mismatch, an attacker with network based access to an affected OctoPrint could extract API keys valid on the instance by measuring the response times of the denied access responses and guess an API key character by character. The vulnerability is patched in version 1.11.6. The likelihood of this attack actually working is highly dependent on the network's latency, noise and similar parameters. An actual proof of concept was not achieved so far. Still, as always administrators are advised to not expose their OctoPrint instance on hostile networks, especially not on the public Internet.

Affected products

OctoPrint
  • ==< 1.11.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-xg4x-w2j3-57h6
Upstream patch: https://github.com/OctoPrint/OctoPrint/commit/249fd80ab01bc4b7dabedff768230a0fb5d01a8c
NIXPKGS-2026-0179
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins)

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.

Affected products

libsoup
  • *
libsoup3
  • *
spice-client-win
  • *

Matching in nixpkgs

Package maintainers

Upstream issue: https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
Upstream patch:
* https://gitlab.gnome.org/GNOME/libsoup/-/commit/d3db5a6f8f03e1f0133754872877c92c0284c472 (libsoup 2)
* https://gitlab.gnome.org/GNOME/libsoup/-/commit/e5af65cf72ea884f9834c457cb2bc0f528dbf03a
NIXPKGS-2026-0149
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • asterisk-ldap
    • asterisk-module-sccp
    • python312Packages.asterisk-mbox
    • python313Packages.asterisk-mbox
    • python314Packages.asterisk-mbox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
The Asterisk embedded web server 's /httpstatus page echos user supplied values(cookie and query string) without sanitization

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerable endpoint relating to asterisk/main /http.c. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2.

Affected products

asterisk
  • ==< 23.2.2
  • ==< 21.12.1
  • ==< 20.7-cert9
  • ==< 20.18.2
  • ==< 22.8.2

Matching in nixpkgs

pkgs.asterisk_18

Software implementation of a telephone private branch exchange (PBX)

Package maintainers

Upstream advisory: https://github.com/asterisk/asterisk/security/advisories/GHSA-v6hp-wh3r-cwxh
NIXPKGS-2026-0137
published on 7 Feb 2026
updated 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed
    2 packages
    • rizinPlugins.sigdb
    • cutterPlugins.sigdb
  • @jopejoe1 accepted
  • @jopejoe1 removed maintainer @chayleaf
  • @jopejoe1 published on GitHub
Rizin has a heap overflow on mach0_chained_fixups.c

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Prior to 0.8.2, a heap overflow can be exploited when a malicious mach0 file, having bogus entries for the dyld chained segments, is parsed by rizin. This vulnerability is fixed in 0.8.2.

Affected products

rizin
  • ==< 0.8.2

Matching in nixpkgs

pkgs.rizin

UNIX-like reverse engineering framework and command-line toolset

Package maintainers

Upstream fix: https://github.com/rizinorg/rizin/releases/tag/v0.8.2
Upstream advisory: https://github.com/rizinorg/rizin/security/advisories/GHSA-f3v7-xhmj-9cjj
Unstable fix: https://github.com/NixOS/nixpkgs/pull/486103
NIXPKGS-2026-0161
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.nicegui-highcharts
    • python313Packages.nicegui-highcharts
    • python314Packages.nicegui-highcharts
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
NiceGUI's Path Traversal via Unsanitized FileUpload.name Enables Arbitrary File Write

NiceGUI is a Python-based UI framework. Prior to 3.7.0, NiceGUI's FileUpload.name property exposes client-supplied filename metadata without sanitization, enabling path traversal when developers use the pattern UPLOAD_DIR / file.name. Malicious filenames containing ../ sequences allow attackers to write files outside intended directories, with potential for remote code execution through application file overwrites in vulnerable deployment patterns. This design creates a prevalent security footgun affecting applications following common community patterns. Note: Exploitation requires application code incorporating file.name into filesystem paths without sanitization. Applications using fixed paths, generated filenames, or explicit sanitization are not affected. This vulnerability is fixed in 3.7.0.

Affected products

nicegui
  • ==< 3.7.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/zauberzeug/nicegui/security/advisories/GHSA-9ffm-fxg3-xrhh