Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0233
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Kanboard TaskCreationController::duplicateProjects() endpoint does not validate user permissions for target projects

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, The fix for CVE-2023-33968 is incomplete. The TaskCreationController::duplicateProjects() endpoint does not validate user permissions for target projects, allowing authenticated users to duplicate tasks into projects they cannot access. This vulnerability is fixed in 1.2.50.

Affected products

kanboard
  • ==< 1.2.50

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/kanboard/kanboard/security/advisories/GHSA-vrm3-3337-whp9
Upstream patch: https://github.com/kanboard/kanboard/commit/df7b7a21ee071f36466d8b38e40d0b0b8b8d394d
NIXPKGS-2026-0244
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package ayatana-webmail
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13, when "Block …

Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13, when "Block remote images" is used, does not block SVG feImage.

Affected products

Webmail
  • <1.5.13
  • <1.6.13
Issue write-up: https://nullcathedral.com/posts/2026-02-08-roundcube-svg-feimage-remote-image-bypass/
Upstream patch: https://github.com/roundcube/roundcubemail/commit/26d7677471b68ff2d02ebe697cb606790b0cf52f
NIXPKGS-2026-0246
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
AprilRobotics apriltag apriltag.c apriltag_detector_detect memory corruption

A security vulnerability has been detected in AprilRobotics apriltag up to 3.4.5. Affected by this vulnerability is the function apriltag_detector_detect of the file apriltag.c. The manipulation leads to memory corruption. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is cfac2f5ce1ffe2de25967eb1ab80bc5d99fc1a61. It is suggested to install a patch to address this issue.

Affected products

apriltag
  • ==3.4.2
  • ==3.4.0
  • ==3.4.5
  • ==3.4.3
  • ==3.4.1
  • ==3.4.4

Matching in nixpkgs

Package maintainers

Upstream issue: https://github.com/AprilRobotics/apriltag/issues/422
Upstream patch: https://github.com/AprilRobotics/apriltag/commit/cfac2f5ce1ffe2de25967eb1ab80bc5d99fc1a61
NIXPKGS-2026-0248
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Vikunja Affected by XSS Via Task Preview

Vikunja is a todo-app to organize your life. Prior to 1.1.0, TaskGlanceTooltip.vue temporarily creates a div and sets the innerHtml to the description. Since there is no escaping on either the server or client side, a malicious user can share a project, create a malicious task, and cause an XSS on hover. This vulnerability is fixed in 1.1.0.

Affected products

vikunja
  • ==< 1.1.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/go-vikunja/vikunja/security/advisories/GHSA-m4g2-2q66-vc9v
Upstream patch: https://github.com/go-vikunja/vikunja/commit/dd0b82f00a8c9ded1c19a1e643a197c514be6d37
NIXPKGS-2026-0243
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ckolivas lrzip stream.c ucompthread null pointer dereference

A security vulnerability has been detected in ckolivas lrzip up to 0.651. This vulnerability affects the function ucompthread of the file stream.c. Such manipulation leads to null pointer dereference. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lrzip
  • ==0.651

Matching in nixpkgs

Upstream issue: https://github.com/ckolivas/lrzip/issues/263
NIXPKGS-2026-0247
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package gobusybox
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Busybox: busybox: arbitrary file modification and privilege escalation via unvalidated tar archive entries

A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.

Affected products

busybox

Matching in nixpkgs

Upstream patch: https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb
NIXPKGS-2026-0241
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • perlPackages.NetSNMP
    • perl538Packages.NetSNMP
    • perl540Packages.NetSNMP
    • tests.pkg-config.defaultPkgConfigPackages.netsnmp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Net-SNMP snmptrapd crash

net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.

Affected products

net-snmp
  • ==< 5.9.5
  • ==>= 5.10.pre1, < 5.10.pre2

Matching in nixpkgs

Upstream advisory: https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq
NIXPKGS-2026-0239
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package ayatana-webmail
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading …

Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.

Affected products

Webmail
  • <1.5.13
  • <1.6.13
Upstream advisory: https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13
NIXPKGS-2026-0237
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    18 packages
    • python312Packages.pillow-heif
    • python312Packages.pillow-jpls
    • python312Packages.pillowfight
    • python313Packages.pillow-heif
    • python313Packages.pillow-jpls
    • python313Packages.pillowfight
    • python314Packages.pillow-heif
    • python314Packages.pillow-jpls
    • python314Packages.pillowfight
    • python312Packages.types-pillow
    • python313Packages.types-pillow
    • python314Packages.types-pillow
    • python312Packages.pypillowfight
    • python313Packages.pypillowfight
    • python314Packages.pillow
    • python313Packages.pillow-avif-plugin
    • python312Packages.pillow-avif-plugin
    • python314Packages.pypillowfight
  • @LeSuisse added package python314Packages.pillow
  • @LeSuisse removed maintainer @mweinelt
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Pillow has an out-of-bounds write when loading PSD images

Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, n out-of-bounds write may be triggered when loading a specially crafted PSD image. This vulnerability is fixed in 12.1.1.

Affected products

Pillow
  • ==>= 10.3.0, < 12.1.1

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Upstream advisory: https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc
Upstream patch: https://github.com/python-pillow/Pillow/commit/9000313cc5d4a31bdcdd6d7f0781101abab553aa
NIXPKGS-2026-0228
published on 15 Feb 2026
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FrankenPHP affected by Path Confusion via Unicode casing in CGI path splitting allows execution of arbitrary files

FrankenPHP is a modern application server for PHP. Prior to 1.11.2, FrankenPHP’s CGI path splitting logic improperly handles Unicode characters during case conversion. The logic computes the split index (for finding .php) on a lowercased copy of the request path but applies that byte index to the original path. Because strings.ToLower() in Go can increase the byte length of certain UTF-8 characters (e.g., Ⱥ expands when lowercased), the computed index may not align with the correct position in the original string. This results in an incorrect SCRIPT_NAME and SCRIPT_FILENAME, potentially causing FrankenPHP to execute a file other than the one intended by the URI. This vulnerability is fixed in 1.11.2.

Affected products

frankenphp
  • ==< 1.11.2

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/php/frankenphp/security/advisories/GHSA-g966-83w7-6w38
Upstream patch: https://github.com/php/frankenphp/commit/04fdc0c1e8fde94e2c1ad86217e962c88d27c53e