NIXPKGS-2026-0334
GitHub issue
published on
Permalink
CVE-2026-27190
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package speech-denoiser
- @LeSuisse removed package openimagedenoise
- @LeSuisse removed package terraform-providers.deno
- @LeSuisse removed package python312Packages.denonavr
- @LeSuisse removed package python313Packages.denonavr
- @LeSuisse removed package haskellPackages.pandoc-sidenote
- @LeSuisse removed package terraform-providers.denoland_deno
- @LeSuisse removed package gnomeExtensions.denon-avr-controler
- @LeSuisse removed package python312Packages.bnunicodenormalizer
- @LeSuisse removed package python313Packages.bnunicodenormalizer
- @LeSuisse removed package python314Packages.bnunicodenormalizer
- @LeSuisse removed package vscode-extensions.denoland.vscode-deno
- @LeSuisse removed package home-assistant-component-tests.denonavr
- @LeSuisse removed package tests.home-assistant-component-tests.denonavr
- @LeSuisse accepted
- @LeSuisse published on GitHub
Deno has a Command Injection via Incomplete shell metacharacter blocklist in node:child_process
Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.
References
-
https://github.com/denoland/deno/security/advisories/GHSA-hmh4-3xvx-q5hr x_refsource_CONFIRM
-
https://github.com/denoland/deno/releases/tag/v2.6.8 x_refsource_MISC
Affected products
deno
- ==< 2.6.8
Package maintainers
-
@ofalvai Olivér Falvai <ofalvai@gmail.com>
-
@06kellyjac Jack <hello+nixpkgs@j-k.io>