Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0211
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package rotp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor

Crafted zones can lead to increased resource usage and crafted CNAME chains can lead to cache poisoning in Recursor.

Affected products

pdns-recursor
  • <5.3.5
  • <5.2.8
  • <5.1.10

Matching in nixpkgs

Package maintainers

Upstream advisory: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-01.html
NIXPKGS-2026-0191
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a Heap-buffer-overflow in audio_formats_free

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vcw2-pqgw-mx6g
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release
NIXPKGS-2026-0208
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter …

In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible

Affected products

PyCharm
  • <2025.3.2

Matching in nixpkgs

Package maintainers

NIXPKGS-2026-0206
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • vscode-extensions.janet-lang.vscode-janet
    • tree-sitter-grammars.tree-sitter-janet-simple
    • vimPlugins.nvim-treesitter-parsers.janet_simple
    • python312Packages.tree-sitter-grammars.tree-sitter-janet-simple
    • python313Packages.tree-sitter-grammars.tree-sitter-janet-simple
    • python314Packages.tree-sitter-grammars.tree-sitter-janet-simple
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
janet-lang janet compile.c janetc_pop_funcdef out-of-bounds

A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The name of the patch is 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. A patch should be applied to remediate this issue.

Affected products

janet
  • ==1.40.0
  • ==1.40.1

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/janet-lang/janet/commit/4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5
NIXPKGS-2026-0204
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.litestar-htmx
    • python313Packages.litestar-htmx
    • python314Packages.litestar-htmx
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Litestar has an AllowedHosts validation bypass due to unescaped regex metacharacters in configured host patterns

Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, in litestar.middleware.allowed_hosts, allowlist entries are compiled into regex patterns in a way that allows regex metacharacters to retain special meaning (e.g., . matches any character). This enables a bypass where an attacker supplies a host that matches the regex but is not the intended literal hostname. This vulnerability is fixed in 2.20.0.

Affected products

litestar
  • ==< 2.20.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/litestar-org/litestar/security/advisories/GHSA-93ph-p7v4-hwh4
Upstream patch: https://github.com/litestar-org/litestar/commit/06b36f481d1bfea6f19995cfb4f203aba45c4ace
NIXPKGS-2026-0202
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a Heap-use-after-free in play_thread

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vcgv-xgjp-h83q
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release
NIXPKGS-2026-0200
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-use-after-free in ainput_send_input_event

FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-45pf-68pj-fg8q
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release
NIXPKGS-2026-0196
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-use-after-free in update_pointer_new(SDL)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, sdl_Pointer_New frees data on failure, then pointer_free calls sdl_Pointer_Free and frees it again, triggering ASan UAF. This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-j893-9wg8-33rc
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release
NIXPKGS-2026-0194
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a Heap-use-after-free in urb_select_interface

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device's MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x9jr-99h2-g7mj
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release
NIXPKGS-2026-0192
published on 10 Feb 2026
updated 3 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-use-after-free in urb_bulk_transfer_cb

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.

Affected products

FreeRDP
  • ==< 3.22.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-ccvv-hg2w-6x9j
Release notes: https://www.freerdp.com/2026/01/28/3_22_0-release