Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-0025
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
SiYuan Vulnerable to Stored Cross-Site Scripting (XSS) via Unrestricted SVG File Upload

SiYuan is self-hosted, open source personal knowledge management software. Prior to 3.5.4-dev2, a Stored Cross-Site Scripting (XSS) vulnerability exists in SiYuan Note. The application does not sanitize uploaded SVG files. If a user uploads and views a malicious SVG file (e.g., imported from an untrusted source), arbitrary JavaScript code is executed in the context of their authenticated session. This vulnerability is fixed in 3.5.4-dev2.

Affected products

siyuan
  • ==< 3.5.4-dev2

Matching in nixpkgs

pkgs.siyuan

Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync

Package maintainers

Upstream advisory: https://github.com/siyuan-note/siyuan/security/advisories/GHSA-pcjq-j3mq-jv5j
Upstream patch: https://github.com/siyuan-note/siyuan/commit/11115da3d0de950593ee4ce375cf7f9018484388
NIXPKGS-2026-0027
published on
Permalink CVE-2026-23535
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package wlcs
  • @LeSuisse removed package wlclock
  • @LeSuisse removed package imewlconverter
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
wlc Path traversal: Unsanitized API slugs in download command

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

Affected products

wlc
  • ==< 1.17.2

Matching in nixpkgs

pkgs.wlc

Weblate commandline client using Weblate's REST API

Package maintainers

Upstream advisory: https://github.com/WeblateOrg/wlc/security/advisories/GHSA-mmwx-79f6-67jg
Upstream patch: https://github.com/WeblateOrg/wlc/commit/216e691c6e50abae97fe2e4e4f21501bf49a585f
NIXPKGS-2026-0024
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package gradle-completion
  • @LeSuisse removed package gradle_7-unwrapped
  • @LeSuisse removed package gradle_8-unwrapped
  • @LeSuisse removed package gradle_9-unwrapped
  • @LeSuisse removed package gradle-dependency-tree-diff
  • @LeSuisse removed package vscode-extensions.vscjava.vscode-gradle
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Affected products

gradle
  • ==< 9.3.0

Matching in nixpkgs

pkgs.gradle_7

Enterprise-grade build system

pkgs.gradle_9

Enterprise-grade build system

Upstream advisory: https://github.com/gradle/gradle/security/advisories/GHSA-mqwm-5m85-gmcv
NIXPKGS-2026-0017
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package gradle-dependency-tree-diff
  • @LeSuisse removed package vscode-extensions.vscjava.vscode-gradle
  • @LeSuisse removed package gradle_9-unwrapped
  • @LeSuisse removed package gradle_8-unwrapped
  • @LeSuisse removed package gradle_7-unwrapped
  • @LeSuisse removed package gradle-completion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Gradle fails to disable repositories which can expose builds to malicious artifacts

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Affected products

gradle
  • ==< 9.3.0

Matching in nixpkgs

pkgs.gradle_7

Enterprise-grade build system

pkgs.gradle_9

Enterprise-grade build system

Upstream advisory: https://github.com/gradle/gradle/security/advisories/GHSA-w78c-w6vf-rw82
NIXPKGS-2026-0018
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package speech-denoiser
  • @LeSuisse removed package openimagedenoise
  • @LeSuisse removed package terraform-providers.deno
  • @LeSuisse removed package python312Packages.denonavr
  • @LeSuisse removed package python313Packages.denonavr
  • @LeSuisse removed package haskellPackages.pandoc-sidenote
  • @LeSuisse removed package terraform-providers.denoland_deno
  • @LeSuisse removed package gnomeExtensions.denon-avr-controler
  • @LeSuisse removed package python312Packages.bnunicodenormalizer
  • @LeSuisse removed package python313Packages.bnunicodenormalizer
  • @LeSuisse removed package vscode-extensions.denoland.vscode-deno
  • @LeSuisse removed package home-assistant-component-tests.denonavr
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Deno node:crypto doesn't finalize cipher

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Before 2.6.0, node:crypto doesn't finalize cipher. The vulnerability allows an attacker to have infinite encryptions. This can lead to naive attempts at brute forcing, as well as more refined attacks with the goal to learn the server secrets. This vulnerability is fixed in 2.6.0.

Affected products

deno
  • ==< 2.6.0

Matching in nixpkgs

pkgs.deno

Secure runtime for JavaScript and TypeScript

Package maintainers

Upstream advisory: https://github.com/denoland/deno/security/advisories/GHSA-5379-f5hf-w38v
NIXPKGS-2026-0019
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-use-after-free in create_irp_thread

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w842-c386-fxhv
NIXPKGS-2026-0020
published on
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
FreeRDP has a heap-buffer-overflow in audin_process_formats

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.

Affected products

FreeRDP
  • ==< 3.20.1

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9chc-g79v-4qq4
NIXPKGS-2026-0021
published on
Permalink CVE-2026-23490
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package python312Packages.pysnmp-pyasn1
  • @LeSuisse removed package python313Packages.pysnmp-pyasn1
  • @LeSuisse removed package python312Packages.pyasn1-modules
  • @LeSuisse removed package python313Packages.pyasn1-modules
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
pyasn1 has a DoS vulnerability in decoder

pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.

Affected products

pyasn1
  • ==< 0.6.2

Matching in nixpkgs

Upstream advisory: https://github.com/pyasn1/pyasn1/security/advisories/GHSA-63vm-454h-vhhq
Upstream fix: https://github.com/pyasn1/pyasn1/commit/3908f144229eed4df24bd569d16e5991ace44970
NIXPKGS-2026-0015
published on
Permalink CVE-2026-0989
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libxml2Python
  • @LeSuisse removed package sbclPackages.cl-libxml2
  • @LeSuisse removed package perlPackages.AlienLibxml2
  • @LeSuisse removed package python312Packages.libxml2
  • @LeSuisse removed package python313Packages.libxml2
  • @LeSuisse removed package perl538Packages.AlienLibxml2
  • @LeSuisse removed package perl540Packages.AlienLibxml2
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: unbounded relaxng include recursion leading to stack overflow

A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.

References

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Fix MR: https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/374
NIXPKGS-2026-0013
published on
Permalink CVE-2026-0861
8.4 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsStdenvUnsupp
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsStdenvUnsupp
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsExplicitEnabled
  • @LeSuisse removed package tests.hardeningFlags.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package tests.hardeningFlags-gcc.glibcxxassertionsExplicitDisabled
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsExplicitEnabled
  • @LeSuisse removed package tests.hardeningFlags-clang.glibcxxassertionsExplicitDisabled
  • @LeSuisse removed package tests.hardeningFlags-gcc.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package tests.hardeningFlags-clang.allExplicitDisabledGlibcxxAssertions
  • @LeSuisse removed package glibcLocalesUtf8
  • @LeSuisse removed package unixtools.getent
  • @LeSuisse removed package unixtools.locale
  • @LeSuisse removed package unixtools.getconf
  • @LeSuisse removed package getent
  • @LeSuisse removed package locale
  • @LeSuisse removed package iconv
  • @LeSuisse removed package mtrace
  • @LeSuisse removed package getconf
  • @LeSuisse removed package libiconv
  • @LeSuisse removed package glibcInfo
  • @LeSuisse removed package glibcLocales
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Integer overflow in memalign leads to heap corruption

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc, valloc, pvalloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Affected products

glibc
  • =<2.42

Matching in nixpkgs

Package maintainers

https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001