Nixpkgs Security Tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0031
published on 18 Jan 2026
Permalink CVE-2025-14017
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • wcurl
    • curlie
    • curlpp
    • phpExtensions.curl
    • curl-impersonate
    • curlWithGnuTls
    • curlMinimal
    • guile-curl
    • curlftpfs
    • curlHTTP3
    • grpcurl
  • @LeSuisse added package curlMinimal
  • @LeSuisse removed
    33 packages
    • curl-impersonate-ff
    • ocamlPackages.curly
    • ocamlPackages.ocurl
    • tclPackages.tclcurl
    • haskellPackages.curl
    • luaPackages.lua-curl
    • perlPackages.WWWCurl
    • php81Extensions.curl
    • php82Extensions.curl
    • php83Extensions.curl
    • haskellPackages.curlhs
    • php84Extensions.curl
    • lua51Packages.lua-curl
    • lua52Packages.lua-curl
    • lua53Packages.lua-curl
    • lua54Packages.lua-curl
    • curl-impersonate-chrome
    • luajitPackages.lua-curl
    • perl538Packages.WWWCurl
    • perl540Packages.WWWCurl
    • haskellPackages.hxt-curl
    • python312Packages.pycurl
    • python313Packages.pycurl
    • python312Packages.curlify
    • python313Packages.curlify
    • tests.pkg-config.defaultPkgConfigPackages.libcurl
    • haskellPackages.recurly-client
    • haskellPackages.curly-expander
    • haskellPackages.curl-cookiejar
    • haskellPackages.download-curl
    • python313Packages.curl-cffi
    • python312Packages.curl-cffi
    • typstPackages.curli_0_1_0
  • @LeSuisse removed
    2 maintainers
    • @Scrumplex
    • @lovek323
  • @LeSuisse added
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse removed
    14 maintainers
    • @GGG-KILLER
    • @deliciouslytyped
    • @Ma27
    • @CrazedProgrammer
    • @knl
    • @ethancedwards8
    • @piotrkwiecinski
    • @aanderse
    • @talyz
    • @chuangzhu
    • @fgaz
    • @bennofs
    • @D4ndellion
    • @sternenseemann
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
broken TLS options for threaded LDAPS

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verification for a specific transfer could unintentionally disable the feature for other threads as well.

Affected products

curl
  • =<7.49.1
  • =<8.12.0
  • =<7.50.2
  • =<7.75.0
  • =<7.18.1
  • =<8.1.1
  • =<7.55.1
  • =<7.37.0
  • =<7.46.0
  • =<7.28.0
  • =<7.21.0
  • =<8.14.1
  • =<7.64.0
  • =<7.64.1
  • =<7.24.0
  • =<7.65.2
  • =<7.27.0
  • =<7.21.4
  • =<7.33.0
  • =<7.37.1
  • =<7.23.0
  • =<8.2.0
  • =<7.22.0
  • =<7.47.0
  • =<7.62.0
  • =<7.21.1
  • =<7.19.5
  • =<7.77.0
  • =<7.40.0
  • =<7.26.0
  • =<8.11.0
  • =<7.72.0
  • =<8.8.0
  • =<8.12.1
  • =<7.18.0
  • =<7.36.0
  • =<7.66.0
  • =<7.38.0
  • =<7.88.1
  • =<7.30.0
  • =<7.65.0
  • =<7.81.0
  • =<8.9.0
  • =<7.79.1
  • =<8.6.0
  • =<8.7.1
  • =<7.63.0
  • =<7.70.0
  • =<7.21.2
  • =<7.67.0
  • =<7.56.1
  • =<7.65.3
  • =<7.54.1
  • =<8.13.0
  • =<7.56.0
  • =<7.54.0
  • =<7.55.0
  • =<7.84.0
  • =<7.19.3
  • =<7.88.0
  • =<7.19.2
  • =<7.76.1
  • =<7.50.0
  • =<7.47.1
  • =<7.39.0
  • =<7.19.0
  • =<7.42.0
  • =<7.28.1
  • =<8.4.0
  • =<7.71.0
  • =<7.17.0
  • =<7.19.1
  • =<7.17.1
  • =<7.31.0
  • =<7.19.6
  • =<7.73.0
  • =<8.14.0
  • =<7.82.0
  • =<7.52.0
  • =<7.42.1
  • =<8.2.1
  • =<8.0.1
  • =<7.86.0
  • =<7.68.0
  • =<8.1.0
  • =<7.50.3
  • =<8.5.0
  • =<7.52.1
  • =<7.21.3
  • =<8.10.0
  • =<7.69.1
  • =<7.45.0
  • =<7.59.0
  • =<7.34.0
  • =<7.20.0
  • =<7.35.0
  • =<7.21.6
  • =<7.48.0
  • =<8.10.1
  • =<7.49.0
  • =<7.65.1
  • =<7.78.0
  • =<7.18.2
  • =<7.58.0
  • =<7.21.7
  • =<7.79.0
  • =<8.16.0
  • =<7.43.0
  • =<7.20.1
  • =<7.71.1
  • =<7.61.0
  • =<7.23.1
  • =<8.15.0
  • =<7.83.0
  • =<7.51.0
  • =<7.19.4
  • =<8.11.1
  • =<7.80.0
  • =<7.25.0
  • =<7.87.0
  • =<7.29.0
  • =<7.60.0
  • =<8.0.0
  • =<7.21.5
  • =<7.61.1
  • =<7.44.0
  • =<7.53.1
  • =<7.50.1
  • =<7.57.0
  • =<7.19.7
  • =<7.74.0
  • =<8.7.0
  • =<7.76.0
  • =<7.85.0
  • =<8.9.1
  • =<8.17.0
  • =<7.32.0
  • =<8.3.0
  • =<7.83.1
  • =<7.69.0
  • =<7.53.0
  • =<8.1.2
  • =<7.41.0

Matching in nixpkgs

pkgs.curl

Command line tool for transferring files with URL syntax

Package maintainers

Ignored maintainers (2)
NIXPKGS-2026-0028
published on 18 Jan 2026
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed maintainer @peterhoeg
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-buffer-overflow in drive_process_irp_read

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0037
published on 18 Jan 2026
Permalink CVE-2025-62394
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: quiz notifications sent to suspended participants

Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information.

References

Affected products

moodle
  • <4.5.7
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0036
published on 18 Jan 2026
Permalink CVE-2025-62401
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: possible to bypass timer in timed assignments

An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.

References

Affected products

moodle
  • <4.1.21
  • <4.5.7
  • <4.4.11
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0035
published on 18 Jan 2026
Permalink CVE-2025-11731
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.libxslt
    • python313Packages.libxslt
  • @LeSuisse removed maintainer @jtojnar
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxslt: type confusion in exsltfuncresultcompfunction of libxslt

A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT <func:result> elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.

Affected products

rhcos
libxslt
  • <1.1.44

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0034
published on 18 Jan 2026
Permalink CVE-2025-12105
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"
    • libsoup_2_4
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libsoup: heap use-after-free in libsoup message queue handling during http/2 read completion

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.

References

Affected products

libsoup
  • =<3.6.5
libsoup3
  • *

Matching in nixpkgs

Package maintainers

Upstream fix: https://gitlab.gnome.org/GNOME/libsoup/-/commit/9ba1243a24e442fa5ec44684617a4480027da960
NIXPKGS-2026-0033
published on 18 Jan 2026
Permalink CVE-2025-68675
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Apache Airflow: proxy credentials for various providers might leak in task logs

In Apache Airflow versions before 3.1.6, the proxies and proxy fields within a Connection may include proxy URLs containing embedded authentication information. These fields were not treated as sensitive by default and therefore were not automatically masked in log output. As a result, when such connections are rendered or printed to logs, proxy credentials embedded in these fields could be exposed. Users are recommended to upgrade to 3.1.6 or later, which fixes this issue

Affected products

apache-airflow
  • <3.1.6

Matching in nixpkgs

Package maintainers

Upstream advisory: https://lists.apache.org/thread/x6kply4nqd4vc4wgxtm6g9r2tt63s8c5
NIXPKGS-2026-0030
published on 18 Jan 2026
Permalink CVE-2025-62395
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse removed maintainer @freezeboy
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: external cohort search service leaks system cohort data

A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data.

References

Affected products

moodle
  • <4.1.21
  • <4.5.7
  • <4.4.11
  • <5.0.3

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Ignored maintainers (1)
NIXPKGS-2026-0024
published on 17 Jan 2026
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • gradle-completion
    • gradle_7-unwrapped
    • gradle_8-unwrapped
    • gradle_9-unwrapped
    • gradle-dependency-tree-diff
    • vscode-extensions.vscjava.vscode-gradle
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Affected products

gradle
  • ==< 9.3.0

Matching in nixpkgs

Upstream advisory: https://github.com/gradle/gradle/security/advisories/GHSA-mqwm-5m85-gmcv
NIXPKGS-2026-0019
published on 17 Jan 2026
updated 2 months, 1 week ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-use-after-free in create_irp_thread

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w842-c386-fxhv