Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0623
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
OliveTin has unsafe parsing of UniqueTrackingId can be used to write files

OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.

Affected products

OliveTin
  • ==< 3000.11.2

Matching in nixpkgs

Package maintainers

https://github.com/OliveTin/OliveTin/security/advisories/GHSA-364q-w7vh-vhpc
NIXPKGS-2026-0583
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-component-tests.glances
  • @mweinelt accepted
  • @mweinelt published on GitHub
Glances Exposes Unauthenticated Configuration Secrets

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.

Affected products

glances
  • ==< 4.5.1

Matching in nixpkgs

Ignored packages (5)

Package maintainers

https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6
https://github.com/nicolargo/glances/commit/306a7136154ba5c1531489c99f8306d84eae37da
NIXPKGS-2026-0599
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Heap Use-After-Free in ImageMagick MSL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-fpvf-frm6-625q
NIXPKGS-2026-0597
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    4 packages
    • pkgsRocm.vllm
    • python312Packages.vllm
    • python313Packages.vllm
    • pkgsRocm.python3Packages.vllm
  • @mweinelt accepted
  • @mweinelt published on GitHub
SSRF Protection Bypass in vLLM

vLLM is an inference and serving engine for large language models (LLMs). The SSRF protection fix for CVE-2026-24779 add in 0.15.1 can be bypassed in the load_from_url_async method due to inconsistent URL parsing behavior between the validation layer and the actual HTTP client. The SSRF fix uses urllib3.util.parse_url() to validate and extract the hostname from user-provided URLs. However, load_from_url_async uses aiohttp for making the actual HTTP requests, and aiohttp internally uses the yarl library for URL parsing. This vulnerability in 0.17.0.

Affected products

vllm
  • ==>= 0.15.1, < 0.17.0

Matching in nixpkgs

Ignored packages (4)

Package maintainers

https://github.com/vllm-project/vllm/security/advisories/GHSA-v359-jj2v-j536
https://github.com/vllm-project/vllm/security/advisories/GHSA-qh4c-xf7m-gxfc
NIXPKGS-2026-0612
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
SiYuan has a Path Traversal in /export Endpoint Allows Arbitrary File Read and Secret Leakage

SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.

Affected products

siyuan
  • ==< 3.5.10

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

https://github.com/siyuan-note/siyuan/security/advisories/GHSA-2h2p-mvfx-868w
NIXPKGS-2026-0594
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has an uninitialized pointer dereference in JBIG decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wj8w-pjxf-9g4f
NIXPKGS-2026-0603
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Integer Overflow leading to out of bounds write in SIXEL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.

Affected products

ImageMagick
  • ==< 7.1.2-16

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r39q-jr8h-gcq2
NIXPKGS-2026-0602
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Path Policy TOCTOU symlink race bypass

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-493f-jh8w-qhx3
NIXPKGS-2026-0622
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
SiYuan has a SVG Sanitizer Bypass via Whitespace in `javascript:` URI — Unauthenticated XSS

SiYuan is a personal knowledge management system. Prior to 3.5.10, SiYuan's SVG sanitizer (SanitizeSVG) checks href attributes for the javascript: prefix using strings.HasPrefix(). However, inserting ASCII tab (&#9;), newline (&#10;), or carriage return (&#13;) characters inside the javascript: string bypasses this prefix check. Browsers strip these characters per the WHATWG URL specification before parsing the URL scheme, so the JavaScript still executes. This allows an attacker to inject executable JavaScript into the unauthenticated /api/icon/getDynamicIcon endpoint, creating a reflected XSS. This is a second bypass of the fix for CVE-2026-29183 (fixed in v3.5.9). This vulnerability is fixed in 3.5.10.

Affected products

siyuan
  • ==< 3.5.10

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

https://github.com/siyuan-note/siyuan/security/advisories/GHSA-pmc9-f5qr-2pcr
NIXPKGS-2026-0624
published on 11 Mar 2026
updated 3 days, 19 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Istio HTTP debug endpoints on port 15014 to enforce namespace-based authorization, preventing cross-namespace proxy data access.

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

Affected products

istio
  • ==< 1.27.8
  • ==>= 1.29.0-alpha.0, < 1.29.1
  • ==>= 1.28.0-alpha.0, < 1.28.5

Matching in nixpkgs

Package maintainers

https://github.com/istio/istio/security/advisories/GHSA-974c-2wxh-g4ww