Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0110
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Arbitrary File Write leading to RCE in n8n Merge Node

n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n8n server's filesystem potentially leading to remote code execution. This issue has been patched in versions 1.118.0 and 2.4.0.

Affected products

n8n
  • ==< 2.4.0
  • ==< 1.118.0

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/482177 (unstable), stable was never impacted
NIXPKGS-2026-0111
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    13 packages
    • alistral
    • typstPackages.minimalistic-latex-cv_0_1_1
    • typstPackages.minimalistic-latex-cv_0_1_0
    • chickenPackages_5.chickenEggs.alist-lib
    • haskellPackages.html-minimalist
    • ue4demos.realistic_rendering
    • akkuPackages.pfds-alist
    • alisthelper
    • ultralist
    • journalist
    • surrealist
    • haskellPackages.alist
    • akkuPackages.slib-alist
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Alist has Insecure TLS Config

Alist is a file list program that supports multiple storages, powered by Gin and Solidjs. Prior to version 3.57.0, the application disables TLS certificate verification by default for all outgoing storage driver communications, making the system vulnerable to Man-in-the-Middle (MitM) attacks. This enables the complete decryption, theft, and manipulation of all data transmitted during storage operations, severely compromising the confidentiality and integrity of user data. This issue has been patched in version 3.57.0.

Affected products

alist
  • ==< 3.57.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/AlistGo/alist/security/advisories/GHSA-8jmm-3xwx-w974
Upstream patch: https://github.com/AlistGo/alist/commit/69629ca76a8f2c8c973ede3b616f93aa26ff23fb
NIXPKGS-2026-0112
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • ocamlPackages.melange
    • ocamlPackages.melange-json
    • ocamlPackages_latest.melange
    • ocamlPackages.melange-json-native
    • ocamlPackages_latest.melange-json
    • ocamlPackages_latest.melange-json-native
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
melange affected by potential host command execution via license-check YAML mode patch pipeline

melange allows users to build apk packages using declarative pipelines. From version 0.10.0 to before 0.40.3, an attacker who can influence inputs to the patch pipeline could execute arbitrary shell commands on the build host. The patch pipeline in pkg/build/pipelines/patch.yaml embeds input-derived values (series paths, patch filenames, and numeric parameters) into shell scripts without proper quoting or validation, allowing shell metacharacters to break out of their intended context. The vulnerability affects the built-in patch pipeline which can be invoked through melange build and melange license-check operations. An attacker who can control patch-related inputs (e.g., through pull request-driven CI, build-as-a-service, or by influencing melange configurations) can inject shell metacharacters such as backticks, command substitutions $(…), semicolons, pipes, or redirections to execute arbitrary commands with the privileges of the melange build process. This issue has been patched in version 0.40.3.

Affected products

melange
  • ==>= 0.10.0, < 0.40.3

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/chainguard-dev/melange/security/advisories/GHSA-rf4g-89h5-crcr
Upstream patch: https://github.com/chainguard-dev/melange/commit/bd132535cd9f57d4bd39d9ead0633598941af030
NIXPKGS-2026-0113
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
NanoMQ $share/ Subscription Validation and Forwarding Parsing Inconsistency: NULL Pointer Increment Causes Crash

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In version 0.24.6, NanoMQ has a protocol parsing / forwarding inconsistency when handling shared subscriptions ($share/). A malformed SUBSCRIBE topic such as $share/ab (missing the second /) is not strictly validated during the subscription stage, so the invalid Topic Filter is stored into the subscription table. Later, when any PUBLISH matches this subscription, the broker send path (nmq_pipe_send_start_v4/v5) performs a second $share/ parsing using strchr() and increments the returned pointer without NULL checks. If the second strchr() returns NULL, sub_topic++ turns the pointer into an invalid address (e.g. 0x1). This invalid pointer is then passed into topic_filtern(), which triggers strlen() and crashes with SIGSEGV. The crash is stable and remotely triggerable. This issue has been patched in version 0.24.7.

Affected products

nanomq
  • === 0.24.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/nanomq/nanomq/security/advisories/GHSA-qv5f-c6v2-2f8h
Upstream patch: https://github.com/nanomq/nanomq/commit/89d68d678e7f841ae7baa45cba8d9bc7ddc9ef4b
NIXPKGS-2026-0114
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Unsafe Buffer Allocation Allows In-Process Memory Disclosure in Task Runner

n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.

Affected products

n8n
  • ==>= 1.65.0, < 1.114.3

Matching in nixpkgs

Package maintainers

Current stable branch was never impacted.
NIXPKGS-2026-0115
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n is Vulnerable to OS Command Injection in Git Node

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.

Affected products

n8n
  • ==< 2.5.0
  • ==< 1.123.10

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-9g95-qf3f-ggrw
NIXPKGS-2026-0116
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow

A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/54dda041211098730221d0ae20a2f9f9173e7a21
NIXPKGS-2026-0117
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n is vulnerable to Python sandbox escape

n8n is an open source workflow automation platform. Prior to version 2.4.8, a vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary. This issue has been patched in version 2.4.8.

Affected products

n8n
  • ==< 2.4.8

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-8398-gmmx-564h
NIXPKGS-2026-0118
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Arbitrary File Write on Remote Systems via SSH Node

n8n is an open source workflow automation platform. Prior to versions 1.123.12 and 2.4.0, when workflows process uploaded files and transfer them to remote servers via the SSH node without validating their metadata the vulnerability can lead to files being written to unintended locations on those remote systems potentially leading to remote code execution on those systems. As a prerequisites an unauthenticated attacker needs knowledge of such workflows existing and the endpoints for file uploads need to be unauthenticated. This issue has been patched in versions 1.123.12 and 2.4.0.

Affected products

n8n
  • ==< 1.123.12
  • ==< 2.4.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-m82q-59gv-mcr9
NIXPKGS-2026-0119
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Navidrome is vulnerable to XSS via comment from song metadata

Navidrome is an open source web-based music collection server and streamer. Prior to version 0.60.0, a cross-site scripting vulnerability in the frontend allows a malicious attacker to inject code through the comment metadata of a song to exfiltrate user credentials. This issue has been patched in version 0.60.0.

Affected products

navidrome
  • ==< 0.60.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-rh3r-8pxm-hg4w
Upstream patch: https://github.com/navidrome/navidrome/commit/d7ec7355c9036d5be659d6ac555c334bb5848ba6