NIXPKGS-2026-0047 published on 20 Jan 2026 CVE-2026-23884 updated 2 days, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 16 hours ago @LeSuisse accepted as draft 2 days, 11 hours ago @LeSuisse published on GitHub 2 days, 11 hours ago Heap-use-after-free in gdi_set_bounds FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi->drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. Affected products FreeRDP ==< 3.21.0 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com> Permalink
CVE-2026-23884 updated 2 days, 11 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 16 hours ago @LeSuisse accepted as draft 2 days, 11 hours ago @LeSuisse published on GitHub 2 days, 11 hours ago Heap-use-after-free in gdi_set_bounds FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi->drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue. Affected products FreeRDP ==< 3.21.0 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com>
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
NIXPKGS-2026-0059 published on 20 Jan 2026 CVE-2025-68616 updated 2 days, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 16 hours ago @LeSuisse removed 2 packages python312Packages.django-weasyprint python313Packages.django-weasyprint 2 days, 10 hours ago @LeSuisse accepted as draft 2 days, 10 hours ago @LeSuisse published on GitHub 2 days, 10 hours ago WeasyPrint Vulnerable to Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue. Affected products WeasyPrint ==< 68.0 Matching in nixpkgs pkgs.python312Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1 pkgs.python313Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1 Package maintainers: 3 @wolfgangwalther Wolfgang Walther <walther@technowledgy.de> @DutchGerman Stefan Visser <stefan.visser@apm-ecampus.de> @hoh Hugo Herter <git@hugoherter.com> Permalink
CVE-2025-68616 updated 2 days, 10 hours ago by @LeSuisse Activity log Created automatic suggestion 2 days, 16 hours ago @LeSuisse removed 2 packages python312Packages.django-weasyprint python313Packages.django-weasyprint 2 days, 10 hours ago @LeSuisse accepted as draft 2 days, 10 hours ago @LeSuisse published on GitHub 2 days, 10 hours ago WeasyPrint Vulnerable to Server-Side Request Forgery (SSRF) Protection Bypass via HTTP Redirect WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue. Affected products WeasyPrint ==< 68.0 Matching in nixpkgs pkgs.python312Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1 pkgs.python313Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1 Package maintainers: 3 @wolfgangwalther Wolfgang Walther <walther@technowledgy.de> @DutchGerman Stefan Visser <stefan.visser@apm-ecampus.de> @hoh Hugo Herter <git@hugoherter.com>
pkgs.python312Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1
pkgs.python313Packages.weasyprint Converts web documents to PDF nixos-unstable 66.0 nixpkgs-unstable 66.0 nixos-unstable-small 66.0 nixos-25.05 65.1 nixos-25.05-small 65.1 nixpkgs-25.05-darwin 65.1
NIXPKGS-2026-0044 published on 19 Jan 2026 CVE-2026-23626 updated 3 days ago by @LeSuisse Activity log Created automatic suggestion 3 days, 16 hours ago @LeSuisse accepted as draft 3 days ago @LeSuisse published on GitHub 3 days ago Kimai Vulnerable to Authenticated Server-Side Template Injection (SSTI) Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue. Affected products kimai ==< 2.46.0 Matching in nixpkgs pkgs.kimai Web-based multi-user time-tracking application nixos-unstable 2.43.0 nixpkgs-unstable 2.43.0 nixos-unstable-small 2.43.0 nixos-25.05 2.33.0 nixos-25.05-small 2.33.0 nixpkgs-25.05-darwin 2.33.0 Package maintainers: 1 @peat-psuwit Ratchanan Srirattanamet <peat@peat-network.xyz> Permalink
CVE-2026-23626 updated 3 days ago by @LeSuisse Activity log Created automatic suggestion 3 days, 16 hours ago @LeSuisse accepted as draft 3 days ago @LeSuisse published on GitHub 3 days ago Kimai Vulnerable to Authenticated Server-Side Template Injection (SSTI) Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue. Affected products kimai ==< 2.46.0 Matching in nixpkgs pkgs.kimai Web-based multi-user time-tracking application nixos-unstable 2.43.0 nixpkgs-unstable 2.43.0 nixos-unstable-small 2.43.0 nixos-25.05 2.33.0 nixos-25.05-small 2.33.0 nixpkgs-25.05-darwin 2.33.0 Package maintainers: 1 @peat-psuwit Ratchanan Srirattanamet <peat@peat-network.xyz>
pkgs.kimai Web-based multi-user time-tracking application nixos-unstable 2.43.0 nixpkgs-unstable 2.43.0 nixos-unstable-small 2.43.0 nixos-25.05 2.33.0 nixos-25.05-small 2.33.0 nixpkgs-25.05-darwin 2.33.0
NIXPKGS-2026-0045 published on 19 Jan 2026 CVE-2026-23829 updated 3 days ago by @LeSuisse Activity log Created automatic suggestion 3 days, 16 hours ago @LeSuisse accepted as draft 3 days ago @LeSuisse published on GitHub 3 days ago Mailpit has SMTP Header Injection via Regex Bypass Mailpit is an email testing tool and API for developers. Prior to version 1.28. Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue. Affected products mailpit ==< 1.28.3 Matching in nixpkgs pkgs.mailpit Email and SMTP testing tool with API for developers nixos-unstable 1.27.11 nixpkgs-unstable 1.27.11 nixos-unstable-small 1.27.11 nixos-25.05 1.24.2 nixos-25.05-small 1.24.2 nixpkgs-25.05-darwin 1.24.2 Package maintainers: 1 @stephank Stéphan Kochen <nix@stephank.nl> Permalink
CVE-2026-23829 updated 3 days ago by @LeSuisse Activity log Created automatic suggestion 3 days, 16 hours ago @LeSuisse accepted as draft 3 days ago @LeSuisse published on GitHub 3 days ago Mailpit has SMTP Header Injection via Regex Bypass Mailpit is an email testing tool and API for developers. Prior to version 1.28. Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue. Affected products mailpit ==< 1.28.3 Matching in nixpkgs pkgs.mailpit Email and SMTP testing tool with API for developers nixos-unstable 1.27.11 nixpkgs-unstable 1.27.11 nixos-unstable-small 1.27.11 nixos-25.05 1.24.2 nixos-25.05-small 1.24.2 nixpkgs-25.05-darwin 1.24.2 Package maintainers: 1 @stephank Stéphan Kochen <nix@stephank.nl>
pkgs.mailpit Email and SMTP testing tool with API for developers nixos-unstable 1.27.11 nixpkgs-unstable 1.27.11 nixos-unstable-small 1.27.11 nixos-25.05 1.24.2 nixos-25.05-small 1.24.2 nixpkgs-25.05-darwin 1.24.2
NIXPKGS-2026-0041 published on 18 Jan 2026 CVE-2025-62399 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed package moodle-dl 4 days, 5 hours ago @LeSuisse removed maintainer @freezeboy 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Moodle: password brute force risk when mobile/web services enabled Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks. Affected products moodle <4.4.11 <4.5.7 <5.0.3 <4.1.21 Matching in nixpkgs pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0 Permalink
CVE-2025-62399 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed package moodle-dl 4 days, 5 hours ago @LeSuisse removed maintainer @freezeboy 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Moodle: password brute force risk when mobile/web services enabled Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks. Affected products moodle <4.4.11 <4.5.7 <5.0.3 <4.1.21 Matching in nixpkgs pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0
pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0
NIXPKGS-2026-0031 published on 18 Jan 2026 CVE-2025-14017 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 11 packages wcurl curlie curlpp phpExtensions.curl curl-impersonate curlWithGnuTls curlMinimal guile-curl curlftpfs curlHTTP3 grpcurl 4 days, 5 hours ago @LeSuisse added package curlMinimal 4 days, 5 hours ago @LeSuisse removed 33 packages curl-impersonate-ff ocamlPackages.curly ocamlPackages.ocurl tclPackages.tclcurl haskellPackages.curl luaPackages.lua-curl perlPackages.WWWCurl php81Extensions.curl php82Extensions.curl php83Extensions.curl haskellPackages.curlhs php84Extensions.curl lua51Packages.lua-curl lua52Packages.lua-curl lua53Packages.lua-curl lua54Packages.lua-curl curl-impersonate-chrome luajitPackages.lua-curl perl538Packages.WWWCurl perl540Packages.WWWCurl haskellPackages.hxt-curl python312Packages.pycurl python313Packages.pycurl python312Packages.curlify python313Packages.curlify tests.pkg-config.defaultPkgConfigPackages.libcurl haskellPackages.recurly-client haskellPackages.curly-expander haskellPackages.curl-cookiejar haskellPackages.download-curl python313Packages.curl-cffi python312Packages.curl-cffi typstPackages.curli_0_1_0 4 days, 5 hours ago @LeSuisse removed 2 maintainers @Scrumplex @lovek323 4 days, 5 hours ago @LeSuisse added 14 maintainers @GGG-KILLER @deliciouslytyped @Ma27 @CrazedProgrammer @knl @ethancedwards8 @piotrkwiecinski @aanderse @talyz @chuangzhu @fgaz @bennofs @D4ndellion @sternenseemann 4 days, 5 hours ago @LeSuisse removed 14 maintainers @GGG-KILLER @deliciouslytyped @Ma27 @CrazedProgrammer @knl @ethancedwards8 @piotrkwiecinski @aanderse @talyz @chuangzhu @fgaz @bennofs @D4ndellion @sternenseemann 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago broken TLS options for threaded LDAPS When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well. Affected products curl =<7.88.0 =<7.36.0 =<8.10.1 =<8.4.0 =<8.16.0 =<8.10.0 =<7.19.4 =<7.26.0 =<7.76.1 =<8.6.0 =<8.1.0 =<7.70.0 =<7.56.0 =<7.25.0 =<7.50.3 =<8.3.0 =<8.11.1 =<7.33.0 =<7.34.0 =<7.54.1 =<7.21.7 =<7.72.0 =<7.43.0 =<7.48.0 =<7.61.1 =<7.67.0 =<8.17.0 =<7.19.6 =<7.87.0 =<7.61.0 =<7.53.1 =<7.17.0 =<8.14.0 =<8.7.0 =<7.73.0 =<7.86.0 =<7.50.2 =<7.29.0 =<7.52.0 =<7.49.1 =<8.12.0 =<8.2.1 =<7.85.0 =<7.41.0 =<7.79.0 =<7.37.1 =<8.13.0 =<7.47.0 =<7.37.0 =<7.75.0 =<7.83.0 =<7.40.0 =<7.20.0 =<7.65.1 =<7.21.6 =<7.27.0 =<7.59.0 =<7.23.1 =<7.21.1 =<7.81.0 =<7.38.0 =<7.24.0 =<7.18.1 =<7.19.1 =<7.42.1 =<7.23.0 =<7.21.5 =<8.9.0 =<7.39.0 =<7.83.1 =<7.50.1 =<7.35.0 =<8.8.0 =<7.21.3 =<7.18.2 =<7.69.0 =<8.9.1 =<8.5.0 =<7.19.2 =<7.20.1 =<7.65.0 =<7.88.1 =<7.56.1 =<7.60.0 =<7.19.0 =<7.18.0 =<8.0.0 =<7.49.0 =<8.14.1 =<8.0.1 =<8.2.0 =<7.65.3 =<7.17.1 =<7.55.0 =<7.28.1 =<7.19.5 =<7.51.0 =<7.64.0 =<7.63.0 =<7.21.0 =<8.15.0 =<7.54.0 =<7.84.0 =<7.45.0 =<7.55.1 =<7.19.7 =<7.53.0 =<7.32.0 =<7.50.0 =<7.71.0 =<7.21.2 =<7.78.0 =<7.66.0 =<7.21.4 =<8.7.1 =<7.52.1 =<7.28.0 =<8.12.1 =<7.74.0 =<7.30.0 =<8.11.0 =<7.62.0 =<7.71.1 =<7.77.0 =<8.1.2 =<7.80.0 =<7.31.0 =<7.42.0 =<7.57.0 =<7.58.0 =<7.76.0 =<7.65.2 =<7.22.0 =<7.69.1 =<7.19.3 =<8.1.1 =<7.68.0 =<7.44.0 =<7.82.0 =<7.47.1 =<7.64.1 =<7.79.1 =<7.46.0 Matching in nixpkgs pkgs.curl Command line tool for transferring files with URL syntax nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1 pkgs.curlFull Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1 pkgs.curlMinimal Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1 Permalink
CVE-2025-14017 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 11 packages wcurl curlie curlpp phpExtensions.curl curl-impersonate curlWithGnuTls curlMinimal guile-curl curlftpfs curlHTTP3 grpcurl 4 days, 5 hours ago @LeSuisse added package curlMinimal 4 days, 5 hours ago @LeSuisse removed 33 packages curl-impersonate-ff ocamlPackages.curly ocamlPackages.ocurl tclPackages.tclcurl haskellPackages.curl luaPackages.lua-curl perlPackages.WWWCurl php81Extensions.curl php82Extensions.curl php83Extensions.curl haskellPackages.curlhs php84Extensions.curl lua51Packages.lua-curl lua52Packages.lua-curl lua53Packages.lua-curl lua54Packages.lua-curl curl-impersonate-chrome luajitPackages.lua-curl perl538Packages.WWWCurl perl540Packages.WWWCurl haskellPackages.hxt-curl python312Packages.pycurl python313Packages.pycurl python312Packages.curlify python313Packages.curlify tests.pkg-config.defaultPkgConfigPackages.libcurl haskellPackages.recurly-client haskellPackages.curly-expander haskellPackages.curl-cookiejar haskellPackages.download-curl python313Packages.curl-cffi python312Packages.curl-cffi typstPackages.curli_0_1_0 4 days, 5 hours ago @LeSuisse removed 2 maintainers @Scrumplex @lovek323 4 days, 5 hours ago @LeSuisse added 14 maintainers @GGG-KILLER @deliciouslytyped @Ma27 @CrazedProgrammer @knl @ethancedwards8 @piotrkwiecinski @aanderse @talyz @chuangzhu @fgaz @bennofs @D4ndellion @sternenseemann 4 days, 5 hours ago @LeSuisse removed 14 maintainers @GGG-KILLER @deliciouslytyped @Ma27 @CrazedProgrammer @knl @ethancedwards8 @piotrkwiecinski @aanderse @talyz @chuangzhu @fgaz @bennofs @D4ndellion @sternenseemann 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago broken TLS options for threaded LDAPS When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well. Affected products curl =<7.88.0 =<7.36.0 =<8.10.1 =<8.4.0 =<8.16.0 =<8.10.0 =<7.19.4 =<7.26.0 =<7.76.1 =<8.6.0 =<8.1.0 =<7.70.0 =<7.56.0 =<7.25.0 =<7.50.3 =<8.3.0 =<8.11.1 =<7.33.0 =<7.34.0 =<7.54.1 =<7.21.7 =<7.72.0 =<7.43.0 =<7.48.0 =<7.61.1 =<7.67.0 =<8.17.0 =<7.19.6 =<7.87.0 =<7.61.0 =<7.53.1 =<7.17.0 =<8.14.0 =<8.7.0 =<7.73.0 =<7.86.0 =<7.50.2 =<7.29.0 =<7.52.0 =<7.49.1 =<8.12.0 =<8.2.1 =<7.85.0 =<7.41.0 =<7.79.0 =<7.37.1 =<8.13.0 =<7.47.0 =<7.37.0 =<7.75.0 =<7.83.0 =<7.40.0 =<7.20.0 =<7.65.1 =<7.21.6 =<7.27.0 =<7.59.0 =<7.23.1 =<7.21.1 =<7.81.0 =<7.38.0 =<7.24.0 =<7.18.1 =<7.19.1 =<7.42.1 =<7.23.0 =<7.21.5 =<8.9.0 =<7.39.0 =<7.83.1 =<7.50.1 =<7.35.0 =<8.8.0 =<7.21.3 =<7.18.2 =<7.69.0 =<8.9.1 =<8.5.0 =<7.19.2 =<7.20.1 =<7.65.0 =<7.88.1 =<7.56.1 =<7.60.0 =<7.19.0 =<7.18.0 =<8.0.0 =<7.49.0 =<8.14.1 =<8.0.1 =<8.2.0 =<7.65.3 =<7.17.1 =<7.55.0 =<7.28.1 =<7.19.5 =<7.51.0 =<7.64.0 =<7.63.0 =<7.21.0 =<8.15.0 =<7.54.0 =<7.84.0 =<7.45.0 =<7.55.1 =<7.19.7 =<7.53.0 =<7.32.0 =<7.50.0 =<7.71.0 =<7.21.2 =<7.78.0 =<7.66.0 =<7.21.4 =<8.7.1 =<7.52.1 =<7.28.0 =<8.12.1 =<7.74.0 =<7.30.0 =<8.11.0 =<7.62.0 =<7.71.1 =<7.77.0 =<8.1.2 =<7.80.0 =<7.31.0 =<7.42.0 =<7.57.0 =<7.58.0 =<7.76.0 =<7.65.2 =<7.22.0 =<7.69.1 =<7.19.3 =<8.1.1 =<7.68.0 =<7.44.0 =<7.82.0 =<7.47.1 =<7.64.1 =<7.79.1 =<7.46.0 Matching in nixpkgs pkgs.curl Command line tool for transferring files with URL syntax nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1 pkgs.curlFull Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1 pkgs.curlMinimal Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1
curl =<7.88.0 =<7.36.0 =<8.10.1 =<8.4.0 =<8.16.0 =<8.10.0 =<7.19.4 =<7.26.0 =<7.76.1 =<8.6.0 =<8.1.0 =<7.70.0 =<7.56.0 =<7.25.0 =<7.50.3 =<8.3.0 =<8.11.1 =<7.33.0 =<7.34.0 =<7.54.1 =<7.21.7 =<7.72.0 =<7.43.0 =<7.48.0 =<7.61.1 =<7.67.0 =<8.17.0 =<7.19.6 =<7.87.0 =<7.61.0 =<7.53.1 =<7.17.0 =<8.14.0 =<8.7.0 =<7.73.0 =<7.86.0 =<7.50.2 =<7.29.0 =<7.52.0 =<7.49.1 =<8.12.0 =<8.2.1 =<7.85.0 =<7.41.0 =<7.79.0 =<7.37.1 =<8.13.0 =<7.47.0 =<7.37.0 =<7.75.0 =<7.83.0 =<7.40.0 =<7.20.0 =<7.65.1 =<7.21.6 =<7.27.0 =<7.59.0 =<7.23.1 =<7.21.1 =<7.81.0 =<7.38.0 =<7.24.0 =<7.18.1 =<7.19.1 =<7.42.1 =<7.23.0 =<7.21.5 =<8.9.0 =<7.39.0 =<7.83.1 =<7.50.1 =<7.35.0 =<8.8.0 =<7.21.3 =<7.18.2 =<7.69.0 =<8.9.1 =<8.5.0 =<7.19.2 =<7.20.1 =<7.65.0 =<7.88.1 =<7.56.1 =<7.60.0 =<7.19.0 =<7.18.0 =<8.0.0 =<7.49.0 =<8.14.1 =<8.0.1 =<8.2.0 =<7.65.3 =<7.17.1 =<7.55.0 =<7.28.1 =<7.19.5 =<7.51.0 =<7.64.0 =<7.63.0 =<7.21.0 =<8.15.0 =<7.54.0 =<7.84.0 =<7.45.0 =<7.55.1 =<7.19.7 =<7.53.0 =<7.32.0 =<7.50.0 =<7.71.0 =<7.21.2 =<7.78.0 =<7.66.0 =<7.21.4 =<8.7.1 =<7.52.1 =<7.28.0 =<8.12.1 =<7.74.0 =<7.30.0 =<8.11.0 =<7.62.0 =<7.71.1 =<7.77.0 =<8.1.2 =<7.80.0 =<7.31.0 =<7.42.0 =<7.57.0 =<7.58.0 =<7.76.0 =<7.65.2 =<7.22.0 =<7.69.1 =<7.19.3 =<8.1.1 =<7.68.0 =<7.44.0 =<7.82.0 =<7.47.1 =<7.64.1 =<7.79.1 =<7.46.0
pkgs.curl Command line tool for transferring files with URL syntax nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1
pkgs.curlFull Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1
pkgs.curlMinimal Command line tool for transferring files with URL syntax nixos-unstable 8.17.0 nixpkgs-unstable 8.17.0 nixos-unstable-small 8.17.0 nixos-25.05 8.14.1 nixos-25.05-small 8.14.1 nixpkgs-25.05-darwin 8.14.1
NIXPKGS-2026-0036 published on 18 Jan 2026 CVE-2025-62401 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed package moodle-dl 4 days, 5 hours ago @LeSuisse removed maintainer @freezeboy 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Moodle: possible to bypass timer in timed assignments An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment. Affected products moodle <4.4.11 <4.5.7 <5.0.3 <4.1.21 Matching in nixpkgs pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0 Permalink
CVE-2025-62401 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 2 months ago @LeSuisse removed package moodle-dl 4 days, 5 hours ago @LeSuisse removed maintainer @freezeboy 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Moodle: possible to bypass timer in timed assignments An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment. Affected products moodle <4.4.11 <4.5.7 <5.0.3 <4.1.21 Matching in nixpkgs pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0
pkgs.moodle Free and open-source learning management system (LMS) written in PHP nixos-unstable 5.0.2 nixpkgs-unstable 5.0.2 nixos-unstable-small 5.0.2 nixos-25.05 5.0 nixos-25.05-small 5.0 nixpkgs-25.05-darwin 5.0
NIXPKGS-2026-0032 published on 18 Jan 2026 CVE-2026-23528 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 16 packages github-distributed-owners haskellPackages.distributed-fork haskellPackages.aivika-distributed haskellPackages.distributed-static haskellPackages.distributed-closure haskellPackages.distributed-process haskellPackages.powerqueue-distributed haskellPackages.distributed-process-ekg haskellPackages.distributed-process-async haskellPackages.distributed-process-tests haskellPackages.distributed-process-extras haskellPackages.distributed-process-systest haskellPackages.distributed-process-execution haskellPackages.distributed-process-supervisor haskellPackages.distributed-process-client-server haskellPackages.distributed-process-monad-control 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Dask distributed Vulnerable to Remote Code Execution via Jupyter Proxy and Dashboard Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0. Affected products distributed ==< 2026.1.0 Matching in nixpkgs pkgs.python312Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0 pkgs.python313Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0 Package maintainers: 2 @teh Tom Hunger <tehunger@gmail.com> @cameroncuttingedge Cameron Byte <buckets-taxiway5l@icloud.com> Permalink
CVE-2026-23528 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 16 packages github-distributed-owners haskellPackages.distributed-fork haskellPackages.aivika-distributed haskellPackages.distributed-static haskellPackages.distributed-closure haskellPackages.distributed-process haskellPackages.powerqueue-distributed haskellPackages.distributed-process-ekg haskellPackages.distributed-process-async haskellPackages.distributed-process-tests haskellPackages.distributed-process-extras haskellPackages.distributed-process-systest haskellPackages.distributed-process-execution haskellPackages.distributed-process-supervisor haskellPackages.distributed-process-client-server haskellPackages.distributed-process-monad-control 4 days, 5 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Dask distributed Vulnerable to Remote Code Execution via Jupyter Proxy and Dashboard Dask distributed is a distributed task scheduler for Dask. Prior to 2026.1.0, when Jupyter Lab, jupyter-server-proxy, and Dask distributed are all run together, it is possible to craft a URL which will result in code being executed by Jupyter due to a cross-side-scripting (XSS) bug in the Dask dashboard. It is possible for attackers to craft a phishing URL that assumes Jupyter Lab and Dask may be running on localhost and using default ports. If a user clicks on the malicious link it will open an error page in the Dask Dashboard via the Jupyter Lab proxy which will cause code to be executed by the default Jupyter Python kernel. This vulnerability is fixed in 2026.1.0. Affected products distributed ==< 2026.1.0 Matching in nixpkgs pkgs.python312Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0 pkgs.python313Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0 Package maintainers: 2 @teh Tom Hunger <tehunger@gmail.com> @cameroncuttingedge Cameron Byte <buckets-taxiway5l@icloud.com>
pkgs.python312Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0
pkgs.python313Packages.distributed Distributed computation in Python nixos-unstable 2025.11.0 nixpkgs-unstable 2025.11.0 nixos-unstable-small 2025.11.0 nixos-25.05 2025.3.0 nixos-25.05-small 2025.3.0 nixpkgs-25.05-darwin 2025.3.0
NIXPKGS-2026-0033 published on 18 Jan 2026 CVE-2025-68675 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Apache Airflow: proxy credentials for various providers might leak in task logs In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue Affected products apache-airflow <3.1.6 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3 Package maintainers: 3 @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com> @ingenieroariel Ariel Nunez <ariel@nunez.co> Permalink
CVE-2025-68675 updated 4 days, 5 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 4 days, 5 hours ago @LeSuisse published on GitHub 4 days, 5 hours ago Apache Airflow: proxy credentials for various providers might leak in task logs In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue Affected products apache-airflow <3.1.6 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3 Package maintainers: 3 @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com> @ingenieroariel Ariel Nunez <ariel@nunez.co>
pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3
NIXPKGS-2026-0028 published on 18 Jan 2026 CVE-2026-22854 updated 4 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed maintainer @peterhoeg 4 days, 7 hours ago @LeSuisse accepted as draft 4 days, 7 hours ago @LeSuisse published on GitHub 4 days, 7 hours ago FreeRDP has a heap-buffer-overflow in drive_process_irp_read FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Permalink
CVE-2026-22854 updated 4 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed maintainer @peterhoeg 4 days, 7 hours ago @LeSuisse accepted as draft 4 days, 7 hours ago @LeSuisse published on GitHub 4 days, 7 hours ago FreeRDP has a heap-buffer-overflow in drive_process_irp_read FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0