NIXPKGS-2026-0024 published on 17 Jan 2026 CVE-2026-22865 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 6 packages gradle-completion gradle_7-unwrapped gradle_8-unwrapped gradle_9-unwrapped gradle-dependency-tree-diff vscode-extensions.vscjava.vscode-gradle 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors. Affected products gradle ==< 9.3.0 Matching in nixpkgs pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6 pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3 pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0 Package maintainers: 10 @lorenzleutgeb Lorenz Leutgeb <lorenz@leutgeb.xyz> @chayleaf Anna Pavlyuk <chayleaf-nix@pavluk.org> @tomodachi94 Tomodachi94 <tomodachi94@protonmail.com> @FliegendeWurst Arne Keller <arne.keller@posteo.de> @liff Olli Helenius <liff@iki.fi> @msgilligan Sean Gilligan <sean@msgilligan.com> @britter Benedikt Ritter <beneritter@gmail.com> @Infinidoge Infinidoge <infinidoge@inx.moe> @JarvisCraft Petr Portnov <mrjarviscraft+nix@gmail.com> @rhoriguchi Ryan Horiguchi <ryan.horiguchi@gmail.com> Permalink
CVE-2026-22865 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 6 packages gradle-completion gradle_7-unwrapped gradle_8-unwrapped gradle_9-unwrapped gradle-dependency-tree-diff vscode-extensions.vscjava.vscode-gradle 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors. Affected products gradle ==< 9.3.0 Matching in nixpkgs pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6 pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3 pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0 Package maintainers: 10 @lorenzleutgeb Lorenz Leutgeb <lorenz@leutgeb.xyz> @chayleaf Anna Pavlyuk <chayleaf-nix@pavluk.org> @tomodachi94 Tomodachi94 <tomodachi94@protonmail.com> @FliegendeWurst Arne Keller <arne.keller@posteo.de> @liff Olli Helenius <liff@iki.fi> @msgilligan Sean Gilligan <sean@msgilligan.com> @britter Benedikt Ritter <beneritter@gmail.com> @Infinidoge Infinidoge <infinidoge@inx.moe> @JarvisCraft Petr Portnov <mrjarviscraft+nix@gmail.com> @rhoriguchi Ryan Horiguchi <ryan.horiguchi@gmail.com>
pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6
pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3
pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0
NIXPKGS-2026-0019 published on 17 Jan 2026 CVE-2026-22856 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago FreeRDP has a heap-use-after-free in create_irp_thread FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com> Permalink
CVE-2026-22856 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago FreeRDP has a heap-use-after-free in create_irp_thread FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com>
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
NIXPKGS-2026-0020 published on 17 Jan 2026 CVE-2026-22852 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago FreeRDP has a heap-buffer-overflow in audin_process_formats FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com> Permalink
CVE-2026-22852 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago FreeRDP has a heap-buffer-overflow in audin_process_formats FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com>
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
NIXPKGS-2026-0021 published on 17 Jan 2026 CVE-2026-23490 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 4 packages python312Packages.pysnmp-pyasn1 python313Packages.pysnmp-pyasn1 python312Packages.pyasn1-modules python313Packages.pyasn1-modules 5 days, 7 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago pyasn1 has a DoS vulnerability in decoder pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2. Affected products pyasn1 ==< 0.6.2 Matching in nixpkgs pkgs.python312Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1 pkgs.python313Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch> Permalink
CVE-2026-23490 updated 5 days, 7 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 4 packages python312Packages.pysnmp-pyasn1 python313Packages.pysnmp-pyasn1 python312Packages.pyasn1-modules python313Packages.pyasn1-modules 5 days, 7 hours ago @LeSuisse accepted as draft 5 days, 7 hours ago @LeSuisse published on GitHub 5 days, 7 hours ago pyasn1 has a DoS vulnerability in decoder pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2. Affected products pyasn1 ==< 0.6.2 Matching in nixpkgs pkgs.python312Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1 pkgs.python313Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1 Package maintainers: 1 @fabaff Fabian Affolter <mail@fabian-affolter.ch>
pkgs.python312Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1
pkgs.python313Packages.pyasn1 Generic ASN.1 library for Python nixos-unstable pyasn1-0.6.1 nixpkgs-unstable pyasn1-0.6.1 nixos-unstable-small pyasn1-0.6.1 nixos-25.05 pyasn1-0.6.1 nixos-25.05-small pyasn1-0.6.1 nixpkgs-25.05-darwin pyasn1-0.6.1
NIXPKGS-2026-0022 published on 17 Jan 2026 CVE-2026-22853 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago FreeRDP has a heap-buffer-overflow in ndr_read_uint8Array FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR’s NDR array reader does not perform bounds checking on the on‑wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com> Permalink
CVE-2026-22853 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago FreeRDP has a heap-buffer-overflow in ndr_read_uint8Array FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR’s NDR array reader does not perform bounds checking on the on‑wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com>
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
NIXPKGS-2026-0023 published on 17 Jan 2026 CVE-2026-22857 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago FreeRDP has a heap-use-after-free in irp_thread_func FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp->Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com> Permalink
CVE-2026-22857 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago FreeRDP has a heap-use-after-free in irp_thread_func FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp->Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1. Affected products FreeRDP ==< 3.20.1 Matching in nixpkgs pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0 Package maintainers: 1 @peterhoeg Peter Hoeg <peter@hoeg.com>
pkgs.freerdp Remote Desktop Protocol Client nixos-unstable 3.17.2 nixpkgs-unstable 3.17.2 nixos-unstable-small 3.17.2 nixos-25.05 3.15.0 nixos-25.05-small 3.15.0 nixpkgs-25.05-darwin 3.15.0
NIXPKGS-2026-0026 published on 17 Jan 2026 CVE-2026-0915 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 24 packages iconv getent locale libc mtrace getconf libiconv glibcInfo glibc_multi glibcLocales glibc_memusage glibcLocalesUtf8 unixtools.getent unixtools.locale unixtools.getconf tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. Affected products glibc =<2.42 Matching in nixpkgs pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> Permalink
CVE-2026-0915 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 24 packages iconv getent locale libc mtrace getconf libiconv glibcInfo glibc_multi glibcLocales glibc_memusage glibcLocalesUtf8 unixtools.getent unixtools.locale unixtools.getconf tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. Affected products glibc =<2.42 Matching in nixpkgs pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me>
pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66
NIXPKGS-2026-0018 published on 17 Jan 2026 CVE-2026-22863 updated 5 days, 8 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 12 packages speech-denoiser openimagedenoise terraform-providers.deno python312Packages.denonavr python313Packages.denonavr haskellPackages.pandoc-sidenote terraform-providers.denoland_deno gnomeExtensions.denon-avr-controler python312Packages.bnunicodenormalizer python313Packages.bnunicodenormalizer vscode-extensions.denoland.vscode-deno home-assistant-component-tests.denonavr 5 days, 8 hours ago @LeSuisse accepted as draft 5 days, 8 hours ago @LeSuisse published on GitHub 5 days, 8 hours ago Deno node:crypto doesn't finalize cipher Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finalize cipher. The vulnerability allows an attacker to have infinite encryptions. This can lead to naive attempts at brute forcing, as well as more refined attacks with the goal to learn the server secrets. This vulnerability is fixed in 2.6.0. Affected products deno ==< 2.6.0 Matching in nixpkgs pkgs.deno Secure runtime for JavaScript and TypeScript nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.05 2.2.12 nixos-25.05-small 2.2.12 nixpkgs-25.05-darwin 2.2.12 Package maintainers: 10 @06kellyjac Jack <hello+nixpkgs@j-k.io> @ofalvai Olivér Falvai <ofalvai@gmail.com> @honnip Jung seungwoo <me@honnip.page> @dotlambda Robert Schütz <rschuetz17@gmail.com> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @mweinelt Martin Weinelt <hexa@darmstadt.ccc.de> @LeshaInc Alexey Nikashkin <leshainc@fomalhaut.me> @Mic92 Jörg Thalheim <joerg@thalheim.io> @magnetophon Bart Brouns <bart@magnetophon.nl> @ratsclub Victor Freire <victor@freire.dev.br> Permalink
CVE-2026-22863 updated 5 days, 8 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 12 packages speech-denoiser openimagedenoise terraform-providers.deno python312Packages.denonavr python313Packages.denonavr haskellPackages.pandoc-sidenote terraform-providers.denoland_deno gnomeExtensions.denon-avr-controler python312Packages.bnunicodenormalizer python313Packages.bnunicodenormalizer vscode-extensions.denoland.vscode-deno home-assistant-component-tests.denonavr 5 days, 8 hours ago @LeSuisse accepted as draft 5 days, 8 hours ago @LeSuisse published on GitHub 5 days, 8 hours ago Deno node:crypto doesn't finalize cipher Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finalize cipher. The vulnerability allows an attacker to have infinite encryptions. This can lead to naive attempts at brute forcing, as well as more refined attacks with the goal to learn the server secrets. This vulnerability is fixed in 2.6.0. Affected products deno ==< 2.6.0 Matching in nixpkgs pkgs.deno Secure runtime for JavaScript and TypeScript nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.05 2.2.12 nixos-25.05-small 2.2.12 nixpkgs-25.05-darwin 2.2.12 Package maintainers: 10 @06kellyjac Jack <hello+nixpkgs@j-k.io> @ofalvai Olivér Falvai <ofalvai@gmail.com> @honnip Jung seungwoo <me@honnip.page> @dotlambda Robert Schütz <rschuetz17@gmail.com> @fabaff Fabian Affolter <mail@fabian-affolter.ch> @mweinelt Martin Weinelt <hexa@darmstadt.ccc.de> @LeshaInc Alexey Nikashkin <leshainc@fomalhaut.me> @Mic92 Jörg Thalheim <joerg@thalheim.io> @magnetophon Bart Brouns <bart@magnetophon.nl> @ratsclub Victor Freire <victor@freire.dev.br>
pkgs.deno Secure runtime for JavaScript and TypeScript nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.05 2.2.12 nixos-25.05-small 2.2.12 nixpkgs-25.05-darwin 2.2.12
NIXPKGS-2026-0027 published on 17 Jan 2026 CVE-2026-23535 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 3 packages wlcs wlclock imewlconverter 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago wlc Path traversal: Unsanitized API slugs in download command wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2. Affected products wlc ==< 1.17.2 Matching in nixpkgs pkgs.wlc Weblate commandline client using Weblate's REST API nixos-unstable 1.16.1 nixpkgs-unstable 1.16.1 nixos-unstable-small 1.16.1 nixos-25.05 1.15 nixos-25.05-small 1.15 nixpkgs-25.05-darwin 1.15 Package maintainers: 4 @xddxdd Yuhui Xu <b980120@hotmail.com> @paperdigits Mica Semrick <mica@silentumbrella.com> @NomisIV Simon Gutgesell <simon@nomisiv.com> @OPNA2608 Cosima Neidahl <opna2608@protonmail.com> Permalink
CVE-2026-23535 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 3 packages wlcs wlclock imewlconverter 5 days, 3 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago wlc Path traversal: Unsanitized API slugs in download command wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2. Affected products wlc ==< 1.17.2 Matching in nixpkgs pkgs.wlc Weblate commandline client using Weblate's REST API nixos-unstable 1.16.1 nixpkgs-unstable 1.16.1 nixos-unstable-small 1.16.1 nixos-25.05 1.15 nixos-25.05-small 1.15 nixpkgs-25.05-darwin 1.15 Package maintainers: 4 @xddxdd Yuhui Xu <b980120@hotmail.com> @paperdigits Mica Semrick <mica@silentumbrella.com> @NomisIV Simon Gutgesell <simon@nomisiv.com> @OPNA2608 Cosima Neidahl <opna2608@protonmail.com>
pkgs.wlc Weblate commandline client using Weblate's REST API nixos-unstable 1.16.1 nixpkgs-unstable 1.16.1 nixos-unstable-small 1.16.1 nixos-25.05 1.15 nixos-25.05-small 1.15 nixpkgs-25.05-darwin 1.15
NIXPKGS-2026-0017 published on 17 Jan 2026 CVE-2026-22816 updated 5 days, 8 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 6 packages gradle-dependency-tree-diff vscode-extensions.vscjava.vscode-gradle gradle_9-unwrapped gradle_8-unwrapped gradle_7-unwrapped gradle-completion 5 days, 8 hours ago @LeSuisse accepted as draft 5 days, 8 hours ago @LeSuisse published on GitHub 5 days, 8 hours ago Gradle fails to disable repositories which can expose builds to malicious artifacts Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors. Affected products gradle ==< 9.3.0 Matching in nixpkgs pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6 pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3 pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0 Package maintainers: 10 @lorenzleutgeb Lorenz Leutgeb <lorenz@leutgeb.xyz> @chayleaf Anna Pavlyuk <chayleaf-nix@pavluk.org> @tomodachi94 Tomodachi94 <tomodachi94@protonmail.com> @FliegendeWurst Arne Keller <arne.keller@posteo.de> @liff Olli Helenius <liff@iki.fi> @msgilligan Sean Gilligan <sean@msgilligan.com> @britter Benedikt Ritter <beneritter@gmail.com> @Infinidoge Infinidoge <infinidoge@inx.moe> @JarvisCraft Petr Portnov <mrjarviscraft+nix@gmail.com> @rhoriguchi Ryan Horiguchi <ryan.horiguchi@gmail.com> Permalink
CVE-2026-22816 updated 5 days, 8 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse removed 6 packages gradle-dependency-tree-diff vscode-extensions.vscjava.vscode-gradle gradle_9-unwrapped gradle_8-unwrapped gradle_7-unwrapped gradle-completion 5 days, 8 hours ago @LeSuisse accepted as draft 5 days, 8 hours ago @LeSuisse published on GitHub 5 days, 8 hours ago Gradle fails to disable repositories which can expose builds to malicious artifacts Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors. Affected products gradle ==< 9.3.0 Matching in nixpkgs pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6 pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3 pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0 Package maintainers: 10 @lorenzleutgeb Lorenz Leutgeb <lorenz@leutgeb.xyz> @chayleaf Anna Pavlyuk <chayleaf-nix@pavluk.org> @tomodachi94 Tomodachi94 <tomodachi94@protonmail.com> @FliegendeWurst Arne Keller <arne.keller@posteo.de> @liff Olli Helenius <liff@iki.fi> @msgilligan Sean Gilligan <sean@msgilligan.com> @britter Benedikt Ritter <beneritter@gmail.com> @Infinidoge Infinidoge <infinidoge@inx.moe> @JarvisCraft Petr Portnov <mrjarviscraft+nix@gmail.com> @rhoriguchi Ryan Horiguchi <ryan.horiguchi@gmail.com>
pkgs.gradle_7 Enterprise-grade build system nixos-unstable 7.6.6 nixpkgs-unstable 7.6.6 nixos-unstable-small 7.6.6 nixos-25.05 7.6.6 nixos-25.05-small 7.6.6 nixpkgs-25.05-darwin 7.6.6
pkgs.gradle_8 Enterprise-grade build system nixos-unstable 8.14.3 nixpkgs-unstable 8.14.3 nixos-unstable-small 8.14.3 nixos-25.05 8.14.3 nixos-25.05-small 8.14.3 nixpkgs-25.05-darwin 8.14.3
pkgs.gradle_9 Enterprise-grade build system nixos-unstable 9.1.0 nixpkgs-unstable 9.1.0 nixos-unstable-small 9.1.0