Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0612
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
SiYuan has a Path Traversal in /export Endpoint Allows Arbitrary File Read and Secret Leakage

SiYuan is a personal knowledge management system. Prior to 3.5.10, a path traversal vulnerability in the /export endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as conf/conf.json, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable administrative access to the SiYuan kernel API, and in certain deployment scenarios could potentially be chained into remote code execution (RCE). This vulnerability is fixed in 3.5.10.

Affected products

siyuan
  • ==< 3.5.10

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

https://github.com/siyuan-note/siyuan/security/advisories/GHSA-2h2p-mvfx-868w
NIXPKGS-2026-0624
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Istio HTTP debug endpoints on port 15014 to enforce namespace-based authorization, preventing cross-namespace proxy data access.

Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.

Affected products

istio
  • ==< 1.27.8
  • ==>= 1.29.0-alpha.0, < 1.29.1
  • ==>= 1.28.0-alpha.0, < 1.28.5

Matching in nixpkgs

Package maintainers

https://github.com/istio/istio/security/advisories/GHSA-974c-2wxh-g4ww
NIXPKGS-2026-0594
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has an uninitialized pointer dereference in JBIG decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wj8w-pjxf-9g4f
NIXPKGS-2026-0588
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-component-tests.glances
  • @mweinelt accepted
  • @mweinelt published on GitHub
Glances has SQL Injection via Process Names in TimescaleDB Export

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export module constructs SQL queries using string concatenation with unsanitized system monitoring data. The normalize() method wraps string values in single quotes but does not escape embedded single quotes, making SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network interface names, or container names. This vulnerability is fixed in 4.5.1.

Affected products

glances
  • ==< 4.5.1

Matching in nixpkgs

Ignored packages (5)

Package maintainers

https://github.com/nicolargo/glances/security/advisories/GHSA-x46r-mf5g-xpr6
https://github.com/nicolargo/glances/commit/39161f0d6fd723d83f534b48f24cdca722573336
NIXPKGS-2026-0602
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Path Policy TOCTOU symlink race bypass

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-493f-jh8w-qhx3
NIXPKGS-2026-0587
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    11 packages
    • opa-envoy-plugin
    • python312Packages.envoy-utils
    • python313Packages.envoy-utils
    • python314Packages.envoy-utils
    • python312Packages.envoy-reader
    • python313Packages.envoy-reader
    • python314Packages.envoy-reader
    • python313Packages.envoy-data-plane
    • python314Packages.envoy-data-plane
    • home-assistant-component-tests.enphase_envoy
    • tests.home-assistant-component-tests.enphase_envoy
  • @mweinelt accepted
  • @mweinelt published on GitHub
Crash for scoped ip address in Envoy during DNS

Envoy is a high-performance edge/middle/service proxy. Prior to 1.37.1, 1.36.5, 1.35.8, and 1.34.13, calling Utility::getAddressWithPort with a scoped IPv6 addresses causes a crash. This utility is called in the data plane from the original_src filter and the dns filter. This vulnerability is fixed in 1.37.1, 1.36.5, 1.35.8, and 1.34.13.

Affected products

envoy
  • ==>= 1.35.0, < 1.35.9
  • ==>= 1.36.0, < 1.36.5
  • ==>= 1.37.0, < 1.37.1
  • ==< 1.34.13

Matching in nixpkgs

Ignored packages (11)

Package maintainers

https://github.com/envoyproxy/envoy/security/advisories/GHSA-3cw6-2j68-868p
NIXPKGS-2026-0621
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    4 packages
    • filebrowser
    • python312Packages.filebrowser-safe
    • python313Packages.filebrowser-safe
    • python314Packages.filebrowser-safe
  • @mweinelt accepted
  • @mweinelt published on GitHub
FileBrowser Quantum Incomplete Remediation of CVE-2026-27611: Password-Protected Share Bypass via /public/api/share/info

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable.

Affected products

filebrowser
  • === 1.1.3-stable
  • ==>= 1.2.6-beta, < 1.2.2-stable
  • ==>= 1.3.0-beta, < 1.3.1-beta

Matching in nixpkgs

Ignored packages (4)

Package maintainers

https://github.com/gtsteffaniak/filebrowser/security/advisories/GHSA-525j-95gf-766f
NIXPKGS-2026-0603
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • imagemagick6
    • imagemagick6Big
    • imagemagick6_light
    • graphicsmagick-imagemagick-compat
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
  • @mweinelt accepted
  • @mweinelt published on GitHub
ImageMagick has a Integer Overflow leading to out of bounds write in SIXEL decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.

Affected products

ImageMagick
  • ==< 7.1.2-16

Matching in nixpkgs

Ignored packages (6)

Package maintainers

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-r39q-jr8h-gcq2
NIXPKGS-2026-0583
published on 11 Mar 2026
updated 3 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • python312Packages.glances-api
    • python313Packages.glances-api
    • python314Packages.glances-api
    • home-assistant-component-tests.glances
    • tests.home-assistant-component-tests.glances
  • @mweinelt accepted
  • @mweinelt published on GitHub
Glances Exposes Unauthenticated Configuration Secrets

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict() with no filtering of sensitive values. The configuration file contains credentials for all configured backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This vulnerability is fixed in 4.5.1.

Affected products

glances
  • ==< 4.5.1

Matching in nixpkgs

Ignored packages (5)

Package maintainers

https://github.com/nicolargo/glances/security/advisories/GHSA-gh4x-f7cq-wwx6
https://github.com/nicolargo/glances/commit/306a7136154ba5c1531489c99f8306d84eae37da
NIXPKGS-2026-0581
published on 9 Mar 2026
updated 5 days, 22 hours ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    8 packages
    • libssh2
    • haskellPackages.libssh
    • haskellPackages.libssh2
    • haskellPackages.libssh2-conduit
    • python312Packages.ansible-pylibssh
    • python313Packages.ansible-pylibssh
    • python314Packages.ansible-pylibssh
    • tests.pkg-config.defaultPkgConfigPackages.libssh2
  • @mweinelt accepted
  • @mweinelt published on GitHub
libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds

A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.

Affected products

libssh
  • ==0.11.0
  • ==0.12.0
  • ==0.11.1
  • ==0.11.2
  • ==0.11.3
  • ==0.11.4

Matching in nixpkgs

Ignored packages (8)

Package maintainers

https://www.libssh.org/security/advisories/libssh-2026-sftp-extensions.txt