NIXPKGS-2026-0025 published on 17 Jan 2026 CVE-2026-23645 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago SiYuan Vulnerable to Stored Cross-Site Scripting (XSS) via Unrestricted SVG File Upload SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session. This vulnerability is fixed in 3.5.4-dev2. Affected products siyuan ==< 3.5.4-dev2 Matching in nixpkgs pkgs.siyuan Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync nixos-unstable 3.4.0 nixpkgs-unstable 3.4.0 nixos-unstable-small 3.4.0 nixos-25.05 3.1.28 nixos-25.05-small 3.1.28 nixpkgs-25.05-darwin 3.1.28 Package maintainers: 2 @TomaSajt TomaSajt @L-Trump Luo Chen <ltrump@163.com> Permalink
CVE-2026-23645 updated 5 days, 3 hours ago by @LeSuisse Activity log Created automatic suggestion 5 days, 16 hours ago @LeSuisse accepted as draft 5 days, 3 hours ago @LeSuisse published on GitHub 5 days, 3 hours ago SiYuan Vulnerable to Stored Cross-Site Scripting (XSS) via Unrestricted SVG File Upload SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session. This vulnerability is fixed in 3.5.4-dev2. Affected products siyuan ==< 3.5.4-dev2 Matching in nixpkgs pkgs.siyuan Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync nixos-unstable 3.4.0 nixpkgs-unstable 3.4.0 nixos-unstable-small 3.4.0 nixos-25.05 3.1.28 nixos-25.05-small 3.1.28 nixpkgs-25.05-darwin 3.1.28 Package maintainers: 2 @TomaSajt TomaSajt @L-Trump Luo Chen <ltrump@163.com>
pkgs.siyuan Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync nixos-unstable 3.4.0 nixpkgs-unstable 3.4.0 nixos-unstable-small 3.4.0 nixos-25.05 3.1.28 nixos-25.05-small 3.1.28 nixpkgs-25.05-darwin 3.1.28
NIXPKGS-2026-0014 published on 16 Jan 2026 CVE-2026-0992 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 11 hours ago @LeSuisse removed 8 packages libxml2Python sbclPackages.cl-libxml2 perlPackages.AlienLibxml2 python312Packages.libxml2 python313Packages.libxml2 perl538Packages.AlienLibxml2 perl540Packages.AlienLibxml2 tests.pkg-config.defaultPkgConfigPackages."libxml-2.0" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libxml2: libxml2: denial of service via crafted xml catalogs A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition. Affected products rhcos libxml2 Matching in nixpkgs pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8 pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8 Package maintainers: 7 @jtojnar Jan Tojnar <jtojnar@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @nagy Daniel Nagy <danielnagy@posteo.de> @lukego Luke Gorrie <luke@snabb.co> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com> Permalink
CVE-2026-0992 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 11 hours ago @LeSuisse removed 8 packages libxml2Python sbclPackages.cl-libxml2 perlPackages.AlienLibxml2 python312Packages.libxml2 python313Packages.libxml2 perl538Packages.AlienLibxml2 perl540Packages.AlienLibxml2 tests.pkg-config.defaultPkgConfigPackages."libxml-2.0" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libxml2: libxml2: denial of service via crafted xml catalogs A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition. Affected products rhcos libxml2 Matching in nixpkgs pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8 pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8 Package maintainers: 7 @jtojnar Jan Tojnar <jtojnar@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @nagy Daniel Nagy <danielnagy@posteo.de> @lukego Luke Gorrie <luke@snabb.co> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8
pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8
NIXPKGS-2026-0015 published on 16 Jan 2026 CVE-2026-0989 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 11 hours ago @LeSuisse removed 8 packages libxml2Python sbclPackages.cl-libxml2 perlPackages.AlienLibxml2 python312Packages.libxml2 python313Packages.libxml2 perl538Packages.AlienLibxml2 perl540Packages.AlienLibxml2 tests.pkg-config.defaultPkgConfigPackages."libxml-2.0" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libxml2: unbounded relaxng include recursion leading to stack overflow A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk. Affected products rhcos libxml2 Matching in nixpkgs pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8 pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8 Package maintainers: 7 @jtojnar Jan Tojnar <jtojnar@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @nagy Daniel Nagy <danielnagy@posteo.de> @lukego Luke Gorrie <luke@snabb.co> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com> Permalink
CVE-2026-0989 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 11 hours ago @LeSuisse removed 8 packages libxml2Python sbclPackages.cl-libxml2 perlPackages.AlienLibxml2 python312Packages.libxml2 python313Packages.libxml2 perl538Packages.AlienLibxml2 perl540Packages.AlienLibxml2 tests.pkg-config.defaultPkgConfigPackages."libxml-2.0" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libxml2: unbounded relaxng include recursion leading to stack overflow A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk. Affected products rhcos libxml2 Matching in nixpkgs pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8 pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8 Package maintainers: 7 @jtojnar Jan Tojnar <jtojnar@gmail.com> @hraban Hraban Luyat <hraban@0brg.net> @nagy Daniel Nagy <danielnagy@posteo.de> @lukego Luke Gorrie <luke@snabb.co> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @Uthar Kasper Gałkowski <galkowskikasper@gmail.com> @gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
pkgs.libxml2 XML parsing library for C nixos-unstable 2.15.1 nixpkgs-unstable 2.15.1 nixos-unstable-small 2.15.1 nixos-25.05 2.13.8 nixos-25.05-small 2.13.8 nixpkgs-25.05-darwin 2.13.8
pkgs.libxml2_13 XML parsing library for C nixos-unstable 2.13.8 nixpkgs-unstable 2.13.8 nixos-unstable-small 2.13.8
NIXPKGS-2026-0016 published on 16 Jan 2026 CVE-2026-0716 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 week ago @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libsoup: out-of-bounds read in libsoup websocket frame processing A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted. Affected products libsoup libsoup3 Matching in nixpkgs pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable 3.6.5 nixpkgs-unstable 3.6.5 nixos-unstable-small 3.6.5 nixos-25.05 3.6.5 nixos-25.05-small 3.6.5 nixpkgs-25.05-darwin 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable 2.74.3 nixpkgs-unstable 2.74.3 nixos-unstable-small 2.74.3 nixos-25.05 2.74.3 nixos-25.05-small 2.74.3 nixpkgs-25.05-darwin 2.74.3 Package maintainers: 6 @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com> Permalink
CVE-2026-0716 updated 5 days, 22 hours ago by @LeSuisse Activity log Created automatic suggestion 1 week ago @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4" 5 days, 22 hours ago @LeSuisse accepted as draft 5 days, 22 hours ago @LeSuisse published on GitHub 5 days, 22 hours ago Libsoup: out-of-bounds read in libsoup websocket frame processing A flaw was found in libsoup’s WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup’s WebSocket support with this configuration may be impacted. Affected products libsoup libsoup3 Matching in nixpkgs pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable 3.6.5 nixpkgs-unstable 3.6.5 nixos-unstable-small 3.6.5 nixos-25.05 3.6.5 nixos-25.05-small 3.6.5 nixpkgs-25.05-darwin 3.6.5 pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable 2.74.3 nixpkgs-unstable 2.74.3 nixos-unstable-small 2.74.3 nixos-25.05 2.74.3 nixos-25.05-small 2.74.3 nixpkgs-25.05-darwin 2.74.3 Package maintainers: 6 @bobby285271 Bobby Rong <rjl931189261@126.com> @lovek323 Jason O'Conal <jason@oconal.id.au> @dasj19 Daniel Șerbănescu <daniel@serbanescu.dk> @7c6f434c Michael Raskin <7c6f434c@mail.ru> @jtojnar Jan Tojnar <jtojnar@gmail.com> @hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
pkgs.libsoup_3 HTTP client/server library for GNOME nixos-unstable 3.6.5 nixpkgs-unstable 3.6.5 nixos-unstable-small 3.6.5 nixos-25.05 3.6.5 nixos-25.05-small 3.6.5 nixpkgs-25.05-darwin 3.6.5
pkgs.libsoup_2_4 HTTP client/server library for GNOME nixos-unstable 2.74.3 nixpkgs-unstable 2.74.3 nixos-unstable-small 2.74.3 nixos-25.05 2.74.3 nixos-25.05-small 2.74.3 nixpkgs-25.05-darwin 2.74.3
NIXPKGS-2026-0013 published on 16 Jan 2026 CVE-2026-0861 updated 5 days, 23 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 9 hours ago @LeSuisse removed 21 packages tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions glibcLocalesUtf8 unixtools.getent unixtools.locale unixtools.getconf getent locale iconv mtrace getconf libiconv glibcInfo glibcLocales 5 days, 23 hours ago @LeSuisse accepted as draft 5 days, 23 hours ago @LeSuisse published on GitHub 5 days, 23 hours ago Integer overflow in memalign leads to heap corruption Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Affected products glibc =<2.42 Matching in nixpkgs pkgs.libc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 pkgs.glibc_multi None nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me> Permalink
CVE-2026-0861 updated 5 days, 23 hours ago by @LeSuisse Activity log Created automatic suggestion 6 days, 9 hours ago @LeSuisse removed 21 packages tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions glibcLocalesUtf8 unixtools.getent unixtools.locale unixtools.getconf getent locale iconv mtrace getconf libiconv glibcInfo glibcLocales 5 days, 23 hours ago @LeSuisse accepted as draft 5 days, 23 hours ago @LeSuisse published on GitHub 5 days, 23 hours ago Integer overflow in memalign leads to heap corruption Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Affected products glibc =<2.42 Matching in nixpkgs pkgs.libc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 pkgs.glibc_multi None nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66 Package maintainers: 2 @ConnorBaker Connor Baker <ConnorBaker01@gmail.com> @Ma27 Maximilian Bosch <maximilian@mbosch.me>
pkgs.glibc GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66
pkgs.glibc_multi None nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66
pkgs.glibc_memusage GNU C Library nixos-unstable 2.40-66 nixpkgs-unstable 2.40-66 nixos-unstable-small 2.40-66 nixos-25.05 2.40-66 nixos-25.05-small 2.40-66 nixpkgs-25.05-darwin 2.40-66
NIXPKGS-2026-0009 published on 13 Jan 2026 CVE-2025-15346 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 2 maintainers @fabaff @vifino 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2. Affected products wolfssl =<5.8.2 Matching in nixpkgs pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2 Permalink
CVE-2025-15346 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 2 maintainers @fabaff @vifino 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago wolfSSL Python library `CERT_REQUIRED` mode fails to enforce client certificate requirement A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2. Affected products wolfssl =<5.8.2 Matching in nixpkgs pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2
pkgs.wolfssl Small, fast, portable implementation of TLS/SSL for embedded devices nixos-unstable 5.8.2 nixpkgs-unstable 5.8.2 nixos-unstable-small 5.8.2 nixos-25.11 5.8.2 nixos-25.11-small 5.8.2 nixpkgs-25.11-darwin 5.8.2 nixos-25.05 5.8.2 nixos-25.05-small 5.8.2 nixpkgs-25.05-darwin 5.8.2
NIXPKGS-2026-0012 published on 13 Jan 2026 CVE-2025-59030 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago Insufficient validation of incoming notifies over TCP can lead to a denial of service in Recursor An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP. Affected products pdns-recursor <5.3.3 <5.2.7 <5.1.9 Matching in nixpkgs pkgs.pdns-recursor Recursive DNS server nixos-unstable 5.2.6 nixpkgs-unstable 5.2.6 nixos-unstable-small 5.2.6 nixos-25.11 5.2.6 nixos-25.11-small 5.2.6 nixpkgs-25.11-darwin 5.2.6 nixos-25.05 5.2.6 nixos-25.05-small 5.2.6 nixpkgs-25.05-darwin 5.2.6 Package maintainers: 1 @rnhmjoj Michele Guerini Rocco <rnhmjoj@inventati.org> Permalink
CVE-2025-59030 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago Insufficient validation of incoming notifies over TCP can lead to a denial of service in Recursor An attacker can trigger the removal of cached records by sending a NOTIFY query over TCP. Affected products pdns-recursor <5.3.3 <5.2.7 <5.1.9 Matching in nixpkgs pkgs.pdns-recursor Recursive DNS server nixos-unstable 5.2.6 nixpkgs-unstable 5.2.6 nixos-unstable-small 5.2.6 nixos-25.11 5.2.6 nixos-25.11-small 5.2.6 nixpkgs-25.11-darwin 5.2.6 nixos-25.05 5.2.6 nixos-25.05-small 5.2.6 nixpkgs-25.05-darwin 5.2.6 Package maintainers: 1 @rnhmjoj Michele Guerini Rocco <rnhmjoj@inventati.org>
pkgs.pdns-recursor Recursive DNS server nixos-unstable 5.2.6 nixpkgs-unstable 5.2.6 nixos-unstable-small 5.2.6 nixos-25.11 5.2.6 nixos-25.11-small 5.2.6 nixpkgs-25.11-darwin 5.2.6 nixos-25.05 5.2.6 nixos-25.05-small 5.2.6 nixpkgs-25.05-darwin 5.2.6
NIXPKGS-2026-0011 published on 13 Jan 2026 CVE-2025-67554 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago WordPress Cookie Notice & Compliance for GDPR / CCPA plugin <= 2.5.8 - Cross Site Scripting (XSS) vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Humanityco Cookie Notice & Compliance for GDPR / CCPA cookie-notice allows Stored XSS.This issue affects Cookie Notice & Compliance for GDPR / CCPA: from n/a through <= 2.5.8. Affected products cookie-notice =<<= 2.5.8 Matching in nixpkgs pkgs.wordpressPackages.plugins.cookie-notice nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.11 2.5.6 nixos-25.11-small 2.5.6 nixpkgs-25.11-darwin 2.5.6 nixos-25.05 2.5.6 nixos-25.05-small 2.5.6 nixpkgs-25.05-darwin 2.5.6 Permalink
CVE-2025-67554 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago WordPress Cookie Notice & Compliance for GDPR / CCPA plugin <= 2.5.8 - Cross Site Scripting (XSS) vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Humanityco Cookie Notice & Compliance for GDPR / CCPA cookie-notice allows Stored XSS.This issue affects Cookie Notice & Compliance for GDPR / CCPA: from n/a through <= 2.5.8. Affected products cookie-notice =<<= 2.5.8 Matching in nixpkgs pkgs.wordpressPackages.plugins.cookie-notice nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.11 2.5.6 nixos-25.11-small 2.5.6 nixpkgs-25.11-darwin 2.5.6 nixos-25.05 2.5.6 nixos-25.05-small 2.5.6 nixpkgs-25.05-darwin 2.5.6
pkgs.wordpressPackages.plugins.cookie-notice nixos-unstable 2.5.6 nixpkgs-unstable 2.5.6 nixos-unstable-small 2.5.6 nixos-25.11 2.5.6 nixos-25.11-small 2.5.6 nixpkgs-25.11-darwin 2.5.6 nixos-25.05 2.5.6 nixos-25.05-small 2.5.6 nixpkgs-25.05-darwin 2.5.6
NIXPKGS-2026-0010 published on 13 Jan 2026 CVE-2025-14946 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 3 packages ocamlPackages.nbd python312Packages.libnbd python313Packages.libnbd 1 week, 1 day ago @LeSuisse removed maintainer @akshatagarwl 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd. Affected products libnbd <1.23.9 <1.22.5 virt:rhel/libnbd container-native-virtualization/virt-cdi-cloner container-native-virtualization/virt-cdi-importer container-native-virtualization/virt-cdi-operator container-native-virtualization/virt-cdi-apiserver container-native-virtualization/virt-cdi-controller container-native-virtualization/virt-cdi-uploadproxy container-native-virtualization/virt-cdi-cloner-rhel9 container-native-virtualization/virt-cdi-uploadserver container-native-virtualization/virt-cdi-importer-rhel9 container-native-virtualization/virt-cdi-operator-rhel9 container-native-virtualization/virt-cdi-apiserver-rhel9 container-native-virtualization/virt-cdi-controller-rhel9 container-native-virtualization/virt-cdi-uploadproxy-rhel9 container-native-virtualization/virt-cdi-uploadserver-rhel9 Matching in nixpkgs pkgs.libnbd Network Block Device client library in userspace nixos-unstable 1.22.1 nixpkgs-unstable 1.22.1 nixos-unstable-small 1.22.1 nixos-25.11 1.22.1 nixos-25.11-small 1.22.1 nixpkgs-25.11-darwin 1.22.1 nixos-25.05 1.22.1 nixos-25.05-small 1.22.1 nixpkgs-25.05-darwin 1.22.1 Permalink
CVE-2025-14946 updated 1 week, 1 day ago by @LeSuisse Activity log Created automatic suggestion 1 week, 6 days ago @LeSuisse removed 3 packages ocamlPackages.nbd python312Packages.libnbd python313Packages.libnbd 1 week, 1 day ago @LeSuisse removed maintainer @akshatagarwl 1 week, 1 day ago @LeSuisse accepted as draft 1 week, 1 day ago @LeSuisse published on GitHub 1 week, 1 day ago Libnbd: libnbd: arbitrary code execution via ssh argument injection through a malicious uri A flaw was found in libnbd. A malicious actor could exploit this by convincing libnbd to open a specially crafted Uniform Resource Identifier (URI). This vulnerability arises because non-standard hostnames starting with '-o' are incorrectly interpreted as arguments to the Secure Shell (SSH) process, rather than as hostnames. This could lead to arbitrary code execution with the privileges of the user running libnbd. Affected products libnbd <1.23.9 <1.22.5 virt:rhel/libnbd container-native-virtualization/virt-cdi-cloner container-native-virtualization/virt-cdi-importer container-native-virtualization/virt-cdi-operator container-native-virtualization/virt-cdi-apiserver container-native-virtualization/virt-cdi-controller container-native-virtualization/virt-cdi-uploadproxy container-native-virtualization/virt-cdi-cloner-rhel9 container-native-virtualization/virt-cdi-uploadserver container-native-virtualization/virt-cdi-importer-rhel9 container-native-virtualization/virt-cdi-operator-rhel9 container-native-virtualization/virt-cdi-apiserver-rhel9 container-native-virtualization/virt-cdi-controller-rhel9 container-native-virtualization/virt-cdi-uploadproxy-rhel9 container-native-virtualization/virt-cdi-uploadserver-rhel9 Matching in nixpkgs pkgs.libnbd Network Block Device client library in userspace nixos-unstable 1.22.1 nixpkgs-unstable 1.22.1 nixos-unstable-small 1.22.1 nixos-25.11 1.22.1 nixos-25.11-small 1.22.1 nixpkgs-25.11-darwin 1.22.1 nixos-25.05 1.22.1 nixos-25.05-small 1.22.1 nixpkgs-25.05-darwin 1.22.1
pkgs.libnbd Network Block Device client library in userspace nixos-unstable 1.22.1 nixpkgs-unstable 1.22.1 nixos-unstable-small 1.22.1 nixos-25.11 1.22.1 nixos-25.11-small 1.22.1 nixpkgs-25.11-darwin 1.22.1 nixos-25.05 1.22.1 nixos-25.05-small 1.22.1 nixpkgs-25.05-darwin 1.22.1
NIXPKGS-2026-0005 published on 11 Jan 2026 CVE-2025-34458 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago wb2osz/direwolf <= 1.8 Reachable Assertion DoS wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 3658a87, contain a reachable assertion vulnerability in the APRS MIC-E decoder function aprs_mic_e() located in src/decode_aprs.c. When processing a specially crafted AX.25 frame containing a MIC-E message with an empty or truncated comment field, the application triggers an unhandled assertion checking for a non-empty comment. This assertion failure causes immediate process termination, allowing a remote, unauthenticated attacker to cause a denial of service by sending malformed APRS traffic. Affected products direwolf ==commit 3658a87 =<1.8 =<1.8.1 Matching in nixpkgs pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7 pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16 Package maintainers: 3 @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @lasandell Luke Sandell <lasandell@gmail.com> @Pandapip1 Gavin John <gavinnjohn@gmail.com> Permalink
CVE-2025-34458 updated 1 week, 4 days ago by @LeSuisse Activity log Created automatic suggestion 1 week, 5 days ago @LeSuisse accepted as draft 1 week, 5 days ago @LeSuisse published on GitHub 1 week, 4 days ago wb2osz/direwolf <= 1.8 Reachable Assertion DoS wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 3658a87, contain a reachable assertion vulnerability in the APRS MIC-E decoder function aprs_mic_e() located in src/decode_aprs.c. When processing a specially crafted AX.25 frame containing a MIC-E message with an empty or truncated comment field, the application triggers an unhandled assertion checking for a non-empty comment. This assertion failure causes immediate process termination, allowing a remote, unauthenticated attacker to cause a denial of service by sending malformed APRS traffic. Affected products direwolf ==commit 3658a87 =<1.8 =<1.8.1 Matching in nixpkgs pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7 pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16 Package maintainers: 3 @sarcasticadmin Robert James Hernandez <rob@sarcasticadmin.com> @lasandell Luke Sandell <lasandell@gmail.com> @Pandapip1 Gavin John <gavinnjohn@gmail.com>
pkgs.direwolf Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.7 nixpkgs-unstable 1.7 nixos-unstable-small 1.7 nixos-25.11 1.7 nixos-25.11-small 1.7 nixpkgs-25.11-darwin 1.7 nixos-25.05 1.7 nixos-25.05-small 1.7 nixpkgs-25.05-darwin 1.7
pkgs.direwolf-unstable Soundcard Packet TNC, APRS Digipeater, IGate, APRStt gateway nixos-unstable 1.8.1-unstable-2025-11-16 nixpkgs-unstable 1.8.1-unstable-2025-11-16 nixos-unstable-small 1.8.1-unstable-2025-11-16 nixos-25.11 1.8.1-unstable-2025-11-16 nixos-25.11-small 1.8.1-unstable-2025-11-16 nixpkgs-25.11-darwin 1.8.1-unstable-2025-11-16