Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-4039
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
OpenClaw Skill Env applySkillConfigenvOverrides code injection

A vulnerability was determined in OpenClaw 2026.2.19-2. This vulnerability affects the function applySkillConfigenvOverrides of the component Skill Env Handler. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. Upgrading to version 2026.2.21-beta.1 is able to resolve this issue. This patch is called 8c9f35cdb51692b650ddf05b259ccdd75cc9a83c. It is recommended to upgrade the affected component.

Affected products

OpenClaw
  • ==2026.2.21-beta.1
  • ==2026.2.19-2

Matching in nixpkgs

Package maintainers

created 1 month, 1 week ago Activity log
  • Created suggestion
Magic Wormhole: "wormhole receive" allows arbitrary local file overwrite

Magic Wormhole makes it possible to get arbitrary-sized files and directories from one computer to another. From 0.21.0 to before 0.23.0, receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs wormhole send) can mount the attack. Other parties (including the transit/relay servers) are excluded by the wormhole protocol. This vulnerability is fixed in 0.23.0.

Affected products

magic-wormhole
  • ==>= 0.21.0, < 0.23.0

Matching in nixpkgs

pkgs.wormhole-rs

Rust implementation of Magic Wormhole, with new features and enhancements

pkgs.magic-wormhole-rs

Rust implementation of Magic Wormhole, with new features and enhancements

Package maintainers

Permalink CVE-2026-3976
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
Tenda W3 POST Parameter WifiMacFilterSet formWifiMacFilterSet stack-based overflow

A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

Affected products

W3
  • ==1.0.0.3(2204)

Matching in nixpkgs

pkgs.w3m

Text-mode web browser

pkgs.Xaw3d

3D widget set based on the Athena Widget set

pkgs.revpfw3

Reverse proxy to bypass the need for port forwarding

pkgs.ilspycmd

Tool for decompiling .NET assemblies and generating portable PDBs

pkgs.libxaw3d

3D appearance variant of the X Athena Widget Set

Permalink CVE-2026-4008
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
Tenda W3 POST Parameter wifiSSIDset stack-based overflow

A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

Affected products

W3
  • ==1.0.0.3(2204)

Matching in nixpkgs

pkgs.w3m

Text-mode web browser

pkgs.Xaw3d

3D widget set based on the Athena Widget set

pkgs.revpfw3

Reverse proxy to bypass the need for port forwarding

pkgs.ilspycmd

Tool for decompiling .NET assemblies and generating portable PDBs

pkgs.libxaw3d

3D appearance variant of the X Athena Widget Set

Permalink CVE-2026-32259
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 1 week ago Activity log
  • Created suggestion
ImageMagick has a possible stack buffer overflow in sixel encoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, when a memory allocation fails in the sixel encoder it would be possible to write past the end of a buffer on the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==>= 7.0.0, < 7.1.2-16
  • ==< 6.9.13-41

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3974
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
Tenda W3 HTTP exeCommand formexeCommand stack-based overflow

A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.

Affected products

W3
  • ==1.0.0.3(2204)

Matching in nixpkgs

pkgs.w3m

Text-mode web browser

pkgs.Xaw3d

3D widget set based on the Athena Widget set

pkgs.revpfw3

Reverse proxy to bypass the need for port forwarding

pkgs.ilspycmd

Tool for decompiling .NET assemblies and generating portable PDBs

pkgs.libxaw3d

3D appearance variant of the X Athena Widget Set

created 1 month, 1 week ago Activity log
  • Created suggestion
Cap'n Proto: Integer overflow in KJ-HTTP chunk size

Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.

Affected products

capnproto
  • ==< 1.4.0

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3975
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
Tenda W3 POST Parameter WifiMacFilterGet formWifiMacFilterGet stack-based overflow

A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

Affected products

W3
  • ==1.0.0.3(2204)

Matching in nixpkgs

pkgs.w3m

Text-mode web browser

pkgs.Xaw3d

3D widget set based on the Athena Widget set

pkgs.revpfw3

Reverse proxy to bypass the need for port forwarding

pkgs.ilspycmd

Tool for decompiling .NET assemblies and generating portable PDBs

pkgs.libxaw3d

3D appearance variant of the X Athena Widget Set

created 1 month, 1 week ago Activity log
  • Created suggestion
Vulnerability in the OpenSSH GSSAPI delta included in various Linux …

Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.

Affected products

openssh
  • <1:10.0p1-5ubuntu5.1
  • <1:8.9p1-3ubuntu0.14
  • <1:9.6p1-3ubuntu13.15

Matching in nixpkgs

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

Package maintainers

Permalink CVE-2026-3979
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago Activity log
  • Created suggestion
quickjs-ng quickjs quickjs.c js_iterator_concat_return use after free

A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack requires local access. The exploit has been published and may be used. Patch name: daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.

Affected products

quickjs
  • ==0.12.1
  • ==0.12.0

Matching in nixpkgs

Package maintainers