Nixpkgs Security Tracker

Login with GitHub

Published issues

NIXPKGS-2026-0047
published on 20 Jan 2026
updated 2 days, 11 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Heap-use-after-free in gdi_set_bounds

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi->drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Affected products

FreeRDP
  • ==< 3.21.0

Matching in nixpkgs

Package maintainers: 1

NIXPKGS-2026-0059
published on 20 Jan 2026
updated 2 days, 10 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.django-weasyprint
    • python313Packages.django-weasyprint
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
WeasyPrint Vulnerable to Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect

WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue.

Affected products

WeasyPrint
  • ==< 68.0

Matching in nixpkgs

pkgs.python312Packages.weasyprint

Converts web documents to PDF

pkgs.python313Packages.weasyprint

Converts web documents to PDF

Package maintainers: 3

NIXPKGS-2026-0044
published on 19 Jan 2026
updated 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Kimai Vulnerable to Authenticated Server-Side Template Injection (SSTI)

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

Affected products

kimai
  • ==< 2.46.0

Matching in nixpkgs

Package maintainers: 1

NIXPKGS-2026-0045
published on 19 Jan 2026
updated 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Mailpit has SMTP Header Injection via Regex Bypass

Mailpit is an email testing tool and API for developers. Prior to version 1.28. Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue.

Affected products

mailpit
  • ==< 1.28.3

Matching in nixpkgs

Package maintainers: 1

NIXPKGS-2026-0041
published on 18 Jan 2026
updated 4 days, 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Moodle: password brute force risk when mobile/web services enabled

Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks.

Affected products

moodle
  • <4.4.11
  • <4.5.7
  • <5.0.3
  • <4.1.21

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

NIXPKGS-2026-0031
published on 18 Jan 2026
updated 4 days, 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • wcurl
    • curlie
    • curlpp
    • phpExtensions.curl
    • curl-impersonate
    • curlWithGnuTls
    • curlMinimal
    • guile-curl
    • curlftpfs
    • curlHTTP3
    • grpcurl
  • @LeSuisse added package curlMinimal
  • @LeSuisse removed
    33 packages
    • curl-impersonate-ff
    • ocamlPackages.curly
    • ocamlPackages.ocurl
    • tclPackages.tclcurl
    • haskellPackages.curl
    • luaPackages.lua-curl
    • perlPackages.WWWCurl
    • php81Extensions.curl
    • php82Extensions.curl
    • php83Extensions.curl
    • haskellPackages.curlhs
    • php84Extensions.curl
    • lua51Packages.lua-curl
    • lua52Packages.lua-curl
    • lua53Packages.lua-curl
    • lua54Packages.lua-curl
    • curl-impersonate-chrome
    • luajitPackages.lua-curl
    • perl538Packages.WWWCurl
    • perl540Packages.WWWCurl
    • haskellPackages.hxt-curl
    • python312Packages.pycurl
    • python313Packages.pycurl
    • python312Packages.curlify
    • python313Packages.curlify
    • tests.pkg-config.defaultPkgConfigPackages.libcurl
    • haskellPackages.recurly-client
    • haskellPackages.curly-expander
    • haskellPackages.curl-cookiejar
    • haskellPackages.download-curl
    • python313Packages.curl-cffi
    • python312Packages.curl-cffi
    • typstPackages.curli_0_1_0
  • @LeSuisse removed
    2 maintainers
    • @Scrumplex
    • @lovek323
  • @LeSuisse added
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse removed
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
broken TLS options for threaded LDAPS

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

Affected products

curl
  • =<7.88.0
  • =<7.36.0
  • =<8.10.1
  • =<8.4.0
  • =<8.16.0
  • =<8.10.0
  • =<7.19.4
  • =<7.26.0
  • =<7.76.1
  • =<8.6.0
  • =<8.1.0
  • =<7.70.0
  • =<7.56.0
  • =<7.25.0
  • =<7.50.3
  • =<8.3.0
  • =<8.11.1
  • =<7.33.0
  • =<7.34.0
  • =<7.54.1
  • =<7.21.7
  • =<7.72.0
  • =<7.43.0
  • =<7.48.0
  • =<7.61.1
  • =<7.67.0
  • =<8.17.0
  • =<7.19.6
  • =<7.87.0
  • =<7.61.0
  • =<7.53.1
  • =<7.17.0
  • =<8.14.0
  • =<8.7.0
  • =<7.73.0
  • =<7.86.0
  • =<7.50.2
  • =<7.29.0
  • =<7.52.0
  • =<7.49.1
  • =<8.12.0
  • =<8.2.1
  • =<7.85.0
  • =<7.41.0
  • =<7.79.0
  • =<7.37.1
  • =<8.13.0
  • =<7.47.0
  • =<7.37.0
  • =<7.75.0
  • =<7.83.0
  • =<7.40.0
  • =<7.20.0
  • =<7.65.1
  • =<7.21.6
  • =<7.27.0
  • =<7.59.0
  • =<7.23.1
  • =<7.21.1
  • =<7.81.0
  • =<7.38.0
  • =<7.24.0
  • =<7.18.1
  • =<7.19.1
  • =<7.42.1
  • =<7.23.0
  • =<7.21.5
  • =<8.9.0
  • =<7.39.0
  • =<7.83.1
  • =<7.50.1
  • =<7.35.0
  • =<8.8.0
  • =<7.21.3
  • =<7.18.2
  • =<7.69.0
  • =<8.9.1
  • =<8.5.0
  • =<7.19.2
  • =<7.20.1
  • =<7.65.0
  • =<7.88.1
  • =<7.56.1
  • =<7.60.0
  • =<7.19.0
  • =<7.18.0
  • =<8.0.0
  • =<7.49.0
  • =<8.14.1
  • =<8.0.1
  • =<8.2.0
  • =<7.65.3
  • =<7.17.1
  • =<7.55.0
  • =<7.28.1
  • =<7.19.5
  • =<7.51.0
  • =<7.64.0
  • =<7.63.0
  • =<7.21.0
  • =<8.15.0
  • =<7.54.0
  • =<7.84.0
  • =<7.45.0
  • =<7.55.1
  • =<7.19.7
  • =<7.53.0
  • =<7.32.0
  • =<7.50.0
  • =<7.71.0
  • =<7.21.2
  • =<7.78.0
  • =<7.66.0
  • =<7.21.4
  • =<8.7.1
  • =<7.52.1
  • =<7.28.0
  • =<8.12.1
  • =<7.74.0
  • =<7.30.0
  • =<8.11.0
  • =<7.62.0
  • =<7.71.1
  • =<7.77.0
  • =<8.1.2
  • =<7.80.0
  • =<7.31.0
  • =<7.42.0
  • =<7.57.0
  • =<7.58.0
  • =<7.76.0
  • =<7.65.2
  • =<7.22.0
  • =<7.69.1
  • =<7.19.3
  • =<8.1.1
  • =<7.68.0
  • =<7.44.0
  • =<7.82.0
  • =<7.47.1
  • =<7.64.1
  • =<7.79.1
  • =<7.46.0

Matching in nixpkgs

pkgs.curl

Command line tool for transferring files with URL syntax

NIXPKGS-2026-0036
published on 18 Jan 2026
updated 4 days, 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Moodle: possible to bypass timer in timed assignments

An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.

Affected products

moodle
  • <4.4.11
  • <4.5.7
  • <5.0.3
  • <4.1.21

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

NIXPKGS-2026-0032
published on 18 Jan 2026
updated 4 days, 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    16 packages
    • github-distributed-owners
    • haskellPackages.distributed-fork
    • haskellPackages.aivika-distributed
    • haskellPackages.distributed-static
    • haskellPackages.distributed-closure
    • haskellPackages.distributed-process
    • haskellPackages.powerqueue-distributed
    • haskellPackages.distributed-process-ekg
    • haskellPackages.distributed-process-async
    • haskellPackages.distributed-process-tests
    • haskellPackages.distributed-process-extras
    • haskellPackages.distributed-process-systest
    • haskellPackages.distributed-process-execution
    • haskellPackages.distributed-process-supervisor
    • haskellPackages.distributed-process-client-server
    • haskellPackages.distributed-process-monad-control
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Dask distributed Vulnerable to Remote Code Execution via Jupyter Proxy and Dashboard

Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0.

Affected products

distributed
  • ==< 2026.1.0

Matching in nixpkgs

Package maintainers: 2

NIXPKGS-2026-0033
published on 18 Jan 2026
updated 4 days, 5 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
Apache Airflow: proxy credentials for various providers might leak in task logs

In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue

Affected products

apache-airflow
  • <3.1.6

Matching in nixpkgs

pkgs.apache-airflow

Programmatically author, schedule and monitor data pipelines

Package maintainers: 3

NIXPKGS-2026-0028
published on 18 Jan 2026
updated 4 days, 7 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed maintainer @peterhoeg
  • @LeSuisse accepted as draft
  • @LeSuisse published on GitHub
FreeRDP has a heap-buffer-overflow in drive_process_irp_read

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs