Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0131
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    28 packages
    • electron-chromedriver_40
    • electron-chromedriver_39
    • electron-chromedriver_38
    • electron-chromedriver_37
    • curl-impersonate-chrome
    • electron-chromedriver_33
    • electron-chromedriver_34
    • electron-chromedriver_35
    • electron-chromedriver_36
    • xorg.xf86videoopenchrome
    • ocamlPackages.chrome-trace
    • noto-fonts-monochrome-emoji
    • python312Packages.pychromecast
    • python313Packages.pychromecast
    • python314Packages.pychromecast
    • ocamlPackages_latest.chrome-trace
    • python312Packages.undetected-chromedriver
    • python313Packages.undetected-chromedriver
    • python314Packages.undetected-chromedriver
    • grafanaPlugins.ventura-psychrometric-panel
    • go-chromecast
    • chromedriver
    • mkchromecast
    • netflix
    • chrome-export
    • chrome-token-signing
    • xf86videoopenchrome
    • chrome-pak-customizer
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 …

Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Affected products

Chrome
  • <144.0.7559.132

Matching in nixpkgs

Package maintainers

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop.html
NIXPKGS-2026-0132
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: libsoup: http request smuggling via malformed chunk headers

A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerability arises from non-RFC-compliant parsing in the soup_filter_input_stream_read_line() logic, where libsoup accepts malformed chunk headers, such as lone line feed (LF) characters instead of the required carriage return and line feed (CRLF). A remote attacker can exploit this without authentication or user interaction by sending specially crafted chunked requests. This allows libsoup to parse and process multiple HTTP requests from a single network message, potentially leading to information disclosure.

Affected products

libsoup
libsoup3

Matching in nixpkgs

Package maintainers

Upstream patch: https://gitlab.gnome.org/GNOME/libsoup/-/commit/b9a1c0663ff8ab6e79715db4b35b54f560416ddd
NIXPKGS-2026-0133
published on 5 Feb 2026
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OpenList affected by Path Traversal in file copy and remove handlers

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.

Affected products

OpenList
  • ==< 4.1.10

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/OpenListTeam/OpenList/security/advisories/GHSA-qmj2-8r24-xxcq
Upstream patch: https://github.com/OpenListTeam/OpenList/commit/7b78fed106382430c69ef351d43f5d09928fff14
NIXPKGS-2026-0091
published on 28 Jan 2026
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled. This vulnerability requires local file write access to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline attacks, the local development environment, and/or compromised dependencies. Rather than just silently sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration, including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access control.

Affected products

phpunit
  • ==>= 12.0.0, < 12.5.8
  • ==< 8.5.52
  • ==>= 10.0.0, < 10.5.62
  • ==>= 11.0.0, < 11.5.50
  • ==>= 9.0.0, < 9.6.33

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-vvj3-c3rp-c85p
Upstream patch: https://github.com/sebastianbergmann/phpunit/commit/3141742e00620e2968d3d2e732d320de76685fda
NIXPKGS-2026-0090
published on 27 Jan 2026
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Shaarli vulnerable to stored XSS via Suggested Tags

Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which starting with `"` prematurely ends the `<input>` tag on the start page and allows an attacker to add arbitrary html leading to a possible XSS attack. Version 0.16.0 fixes the issue.

Affected products

Shaarli
  • ==< 0.16.0

Matching in nixpkgs

pkgs.shaarli

Personal, minimalist, super-fast, database free, bookmarking service

Package maintainers

Upstream advisory: https://github.com/shaarli/Shaarli/security/advisories/GHSA-g3xq-mj52-f8pg
Upstream patch: https://github.com/shaarli/Shaarli/commit/b854c789289c4b0dfbb7c1e5793bae7d8f94e063
NIXPKGS-2026-0089
published on 27 Jan 2026
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package unixtools.ping
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ping in iputils through 20240905 allows a denial of service …

ping in iputils through 20240905 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.

Affected products

iputils
  • =<20240905
  • <20250602

Matching in nixpkgs

Package maintainers

Upstream patch/advisory: https://github.com/iputils/iputils/commit/070cfacd7348386173231fb16fad4983d4e6ae40
Release notes: https://github.com/iputils/iputils/releases/tag/20250602
NIXPKGS-2026-0088
published on 26 Jan 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: moodle: remote code execution via insufficient restore input validation

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.

Affected products

moodle
  • <5.1.1
  • <5.0.4
  • <4.5.8
  • <4.1.0
  • <4.1.22
  • <4.4.12

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Upstream advisory: https://moodle.org/mod/forum/discuss.php?d=471297#p1892199
Upstream patch: https://github.com/moodle/moodle/commit/1e7ff52667b88025ac919dbd84ee6a81dcc3166b
NIXPKGS-2026-0084
published on 23 Jan 2026
updated 4 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    16 packages
    • fleetctl
    • fleeting-plugin-aws
    • azure-cli-extensions.fleet
    • python312Packages.tesla-fleet-api
    • python313Packages.tesla-fleet-api
    • haskellPackages.amazonka-iotfleethub
    • haskellPackages.amazonka-iotfleetwise
    • python312Packages.mypy-boto3-iotfleethub
    • python313Packages.mypy-boto3-iotfleethub
    • python312Packages.mypy-boto3-iotfleetwise
    • python313Packages.mypy-boto3-iotfleetwise
    • home-assistant-component-tests.tesla_fleet
    • python312Packages.types-aiobotocore-iotfleethub
    • python313Packages.types-aiobotocore-iotfleethub
    • python312Packages.types-aiobotocore-iotfleetwise
    • python313Packages.types-aiobotocore-iotfleetwise
  • @LeSuisse removed maintainer @ulrikstrid
  • @LeSuisse added maintainer @katexochen
  • @LeSuisse removed maintainer @asauzeau
  • @LeSuisse added
    5 maintainers
    • @commiterate
    • @dotlambda
    • @fabaff
    • @mweinelt
    • @mbalatsko
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Fleet has a JWT signature bypass vulnerability in Azure AD MDM enrollment

Fleet is open source device management software. In versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3, a vulnerability in Fleet's Windows MDM enrollment flow could allow an attacker to submit forged authentication tokens that are not properly validated. Because JWT signatures were not verified, Fleet could accept attacker-controlled identity claims, enabling enrollment of unauthorized devices under arbitrary Azure AD user identities. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, affected Fleet users should temporarily disable Windows MDM.

Affected products

fleet
  • ==>= 4.78.0, < 4.78.3
  • ==>= 4.76.0, < 4.76.2
  • ==>= 4.77.0, < 4.77.1
  • ==< 4.53.3
  • ==>= 4.75.0, < 4.75.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)

Additional maintainers

Upstream advisory: https://github.com/fleetdm/fleet/security/advisories/GHSA-63m5-974w-448v
NIXPKGS-2026-0083
published on 23 Jan 2026
updated 4 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • fleetctl
    • fleeting-plugin-aws
    • python313Packages.types-aiobotocore-iotfleetwise
    • python312Packages.types-aiobotocore-iotfleetwise
  • @LeSuisse removed
    3 maintainers
    • @katexochen
    • @ulrikstrid
    • @asauzeau
  • @LeSuisse added maintainer @commiterate
  • @LeSuisse removed
    4 maintainers
    • @dotlambda
    • @fabaff
    • @mweinelt
    • @mbalatsko
  • @LeSuisse removed
    12 packages
    • python313Packages.types-aiobotocore-iotfleethub
    • python312Packages.types-aiobotocore-iotfleethub
    • home-assistant-component-tests.tesla_fleet
    • python313Packages.mypy-boto3-iotfleetwise
    • python312Packages.mypy-boto3-iotfleetwise
    • python313Packages.mypy-boto3-iotfleethub
    • python312Packages.mypy-boto3-iotfleethub
    • haskellPackages.amazonka-iotfleetwise
    • haskellPackages.amazonka-iotfleethub
    • python313Packages.tesla-fleet-api
    • python312Packages.tesla-fleet-api
    • azure-cli-extensions.fleet
  • @LeSuisse removed maintainer @commiterate
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Fleet has an Access Control vulnerability in debug/pprof endpoints

Fleet is open source device management software. A broken access control issue in versions prior to 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 allowed authenticated users to access debug and profiling endpoints regardless of role. As a result, low-privilege users could view internal server diagnostics and trigger resource-intensive profiling operations. Fleet’s debug/pprof endpoints are accessible to any authenticated user regardless of role, including the lowest-privilege “Observer” role. This allows low-privilege users to access sensitive server internals, including runtime profiling data and in-memory application state, and to trigger CPU-intensive profiling operations that could lead to denial of service. Versions 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 fix the issue. If an immediate upgrade is not possible, users should put the debug/pprof endpoints behind an IP allowlist as a workaround.

Affected products

fleet
  • ==>= 4.78.0, < 4.78.3
  • ==>= 4.76.0, < 4.76.2
  • ==>= 4.77.0, < 4.77.1
  • ==< 4.53.3
  • ==>= 4.75.0, < 4.75.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Upstream advisory: https://github.com/fleetdm/fleet/security/advisories/GHSA-4r5r-ccr6-q6f6
NIXPKGS-2026-0082
published on 23 Jan 2026
updated 4 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
telnetd in GNU Inetutils through 2.7 allows remote authentication bypass …

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Affected products

Inetutils
  • =<2.7

Matching in nixpkgs

Package maintainers

Upstream advisory: https://lists.gnu.org/archive/html/bug-inetutils/2026-01/msg00004.html