Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0143
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package hedgedoc-cli
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
HedgeDoc security headers for uploaded files were not working

HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.6, files served below the /uploads/ endpoint did not use a more strict security-policy. This resulted in a too open Content-Security-Policy and furthermore opened the possibility to host malicious interactive web content (such as fake login forms) using SVG files. This vulnerability is fixed in 1.10.6.

Affected products

hedgedoc
  • ==< 1.10.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-x74j-jmf9-534w
Upstream fix: https://github.com/hedgedoc/hedgedoc/commit/b930fe04cee92cd4723044030bb59c36781c7137 https://github.com/hedgedoc/hedgedoc/commit/74daa0e7a1cbfafd9aeb255eaf064dfe47cd401c
NIXPKGS-2026-0146
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.nicegui-highcharts
    • python313Packages.nicegui-highcharts
    • python314Packages.nicegui-highcharts
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
NiceGUI's XSS vulnerability in ui.markdown() allows arbitrary JavaScript execution through unsanitized HTML content

NiceGUI is a Python-based UI framework. The ui.markdown() component uses the markdown2 library to convert markdown content to HTML, which is then rendered via innerHTML. By default, markdown2 allows raw HTML to pass through unchanged. This means that if an application renders user-controlled content through ui.markdown(), an attacker can inject malicious HTML containing JavaScript event handlers. Unlike other NiceGUI components that render HTML (ui.html(), ui.chat_message(), ui.interactive_image()), the ui.markdown() component does not provide or require a sanitize parameter, leaving applications vulnerable to XSS attacks. This vulnerability is fixed in 3.7.0.

Affected products

nicegui
  • ==< 3.7.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/zauberzeug/nicegui/security/advisories/GHSA-v82v-c5x8-w282
Upstream patch: https://github.com/zauberzeug/nicegui/commit/f1f7533577875af7d23f161ed3627f73584cb561
NIXPKGS-2026-0144
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Trilium Notes has a Timing Attack Vulnerability in /api/login/sync

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. Prior to 0.101.0, a critical timing attack vulnerability in Trilium's sync authentication endpoint allows unauthenticated remote attackers to recover HMAC authentication hashes byte-by-byte through statistical timing analysis. This enables complete authentication bypass without password knowledge, granting full read/write access to victim's knowledge base. This vulnerability is fixed in 0.101.0.

Affected products

Trilium
  • ==< 0.101.0

Matching in nixpkgs

pkgs.trilium-desktop

Hierarchical note taking application with focus on building large personal knowledge bases

Package maintainers

Upstream advisory: https://github.com/TriliumNext/Trilium/security/advisories/GHSA-hxf6-58cx-qq3x
Upstream PR: https://github.com/TriliumNext/Trilium/pull/8129
NIXPKGS-2026-0168
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • curaPlugins.octoprint
    • python312Packages.pyoctoprintapi
    • python313Packages.pyoctoprintapi
    • home-assistant-component-tests.octoprint
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
OctoPrint has Timing Side-Channel Vulnerability in API Key Authentication

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up to and including 1.11.5 are affected by a (theoretical) timing attack vulnerability that allows API key extraction over the network. Due to using character based comparison that short-circuits on the first mismatched character during API key validation, rather than a cryptographical method with static runtime regardless of the point of mismatch, an attacker with network based access to an affected OctoPrint could extract API keys valid on the instance by measuring the response times of the denied access responses and guess an API key character by character. The vulnerability is patched in version 1.11.6. The likelihood of this attack actually working is highly dependent on the network's latency, noise and similar parameters. An actual proof of concept was not achieved so far. Still, as always administrators are advised to not expose their OctoPrint instance on hostile networks, especially not on the public Internet.

Affected products

OctoPrint
  • ==< 1.11.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-xg4x-w2j3-57h6
Upstream patch: https://github.com/OctoPrint/OctoPrint/commit/249fd80ab01bc4b7dabedff768230a0fb5d01a8c
NIXPKGS-2026-0142
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • zulip-term
    • matrix-zulip-bridge
    • python312Packages.zulip
    • python313Packages.zulip
    • python314Packages.zulip
    • python312Packages.zulip-emoji-mapping
    • python313Packages.zulip-emoji-mapping
    • python314Packages.zulip-emoji-mapping
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Zulip affected by Stored XSS in user profile modal

Zulip is an open-source team collaboration tool. From 5.0 to before 11.5, some administrative actions on the user profile were susceptible to stored XSS in group names or channel names. Exploiting these vulnerabilities required the user explicitly interacting with the problematic object. This vulnerability is fixed in 11.5.

Affected products

zulip
  • ==>= 5.0, < 11.5

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/zulip/zulip/security/advisories/GHSA-56qv-8823-6fq9
Upstream patch: https://github.com/zulip/zulip/commit/e6093d9e4788f4d82236d856c5ed7b16767886a7
NIXPKGS-2026-0170
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • tests.pkg-config.defaultPkgConfigPackages.alsa
    • tests.pkg-config.defaultPkgConfigPackages.alsa-topology
    • alsa-lib-with-plugins
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
alsa-lib 1.2.15.2 Topology Decoder Heap-based Buffer Overflow

alsa-lib versions 1.2.2 up to and including 1.2.15.2, prior to commit 5f7fe33, contain a heap-based buffer overflow in the topology mixer control decoder. The tplg_decode_control_mixer1() function reads the num_channels field from untrusted .tplg data and uses it as a loop bound without validating it against the fixed-size channel array (SND_TPLG_MAX_CHAN). A crafted topology file with an excessive num_channels value can cause out-of-bounds heap writes, leading to a crash.

Affected products

alsa-lib
  • <1.2.15.2
  • ==commit 5f7fe33

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40
NIXPKGS-2026-0172
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
tcpflow has TIM Element OOB Write in wifipcap

tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.

Affected products

tcpflow
  • ==<= 1.61

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/simsong/tcpflow/security/advisories/GHSA-q5q6-frrv-9rj6
Upstream patch: https://github.com/simsong/tcpflow/commit/1d84fe8d59bb52c9a9da446a0fe6a31b2de15612
NIXPKGS-2026-0167
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Suricata datasets: stack overflow when saving a set

Suricata is a network IDS, IPS and NSM engine. While saving a dataset a stack buffer is used to prepare the data. Prior to versions 8.0.3 and 7.0.14, if the data in the dataset is too large, this can result in a stack overflow. Versions 8.0.3 and 7.0.14 contain a patch. As a workaround, do not use rules with datasets `save` nor `state` options.

Affected products

suricata
  • ==< 7.0.14
  • ==>= 8.0.0, < 8.0.3

Matching in nixpkgs

pkgs.suricata

Free and open source, mature, fast and robust network threat detection engine

Package maintainers

Upstream advisory: https://github.com/OISF/suricata/security/advisories/GHSA-9qg5-2gwh-xp86
NIXPKGS-2026-0150
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • gnomeExtensions.claude-code-usage-indicator
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-switcher
    • claude-code-bin
    • claude-code-acp
    • claude-code-router
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.

Affected products

claude-code
  • ==< 2.0.55

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4
NIXPKGS-2026-0148
published on 7 Feb 2026
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
micropython runtime.c mp_import_all memory corruption

A flaw has been found in micropython up to 1.27.0. This vulnerability affects the function mp_import_all of the file py/runtime.c. This manipulation causes memory corruption. The attack needs to be launched locally. The exploit has been published and may be used. Patch name: 570744d06c5ba9dba59b4c3f432ca4f0abd396b6. It is suggested to install a patch to address this issue.

Affected products

micropython
  • ==1.7
  • ==1.14
  • ==1.6
  • ==1.21
  • ==1.4
  • ==1.25
  • ==1.3
  • ==1.27.0
  • ==1.2
  • ==1.11
  • ==1.20
  • ==1.1
  • ==1.9
  • ==1.24
  • ==1.19
  • ==1.16
  • ==1.0
  • ==1.23
  • ==1.22
  • ==1.18
  • ==1.26
  • ==1.5
  • ==1.10
  • ==1.15
  • ==1.8
  • ==1.17
  • ==1.12
  • ==1.13

Matching in nixpkgs

Package maintainers

Upstream issue: https://github.com/micropython/micropython/issues/18639
Upstream patch: https://github.com/dpgeorge/micropython/commit/570744d06c5ba9dba59b4c3f432ca4f0abd396b6