Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-28692
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 month, 1 week ago Activity log
  • Created suggestion
ImageMagick has a heap buffer over-read via 32-bit integer overflow in MAT decoder

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Affected products

ImageMagick
  • ==< 6.9.13-41
  • ==>= 7.0.0, < 7.1.2-16

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3731
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 2 weeks ago Activity log
  • Created suggestion
libssh SFTP Extension Name sftp.c sftp_extensions_get_data out-of-bounds

A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.

Affected products

libssh
  • ==0.11.1
  • ==0.11.0
  • ==0.11.2
  • ==0.11.4
  • ==0.12.0
  • ==0.11.3

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3706
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 2 weeks ago Activity log
  • Created suggestion
mkj Dropbear S Range Check curve25519.c unpackneg signature verification

A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of the file src/curve25519.c of the component S Range Check. This manipulation causes improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is considered difficult. The exploit has been publicly disclosed and may be utilized. Patch name: fdec3c90a15447bd538641d85e5a3e3ac981011d. To fix this issue, it is recommended to deploy a patch.

Affected products

Dropbear
  • ==2025.52
  • ==2025.2
  • ==2025.48
  • ==2025.78
  • ==2025.81
  • ==2025.85
  • ==2025.54
  • ==2025.28
  • ==2025.21
  • ==2025.39
  • ==2025.79
  • ==2025.3
  • ==2025.18
  • ==2025.22
  • ==2025.88
  • ==2025.26
  • ==2025.41
  • ==2025.19
  • ==2025.68
  • ==2025.37
  • ==2025.6
  • ==2025.55
  • ==2025.10
  • ==2025.69
  • ==2025.56
  • ==2025.64
  • ==2025.60
  • ==2025.80
  • ==2025.84
  • ==2025.86
  • ==2025.45
  • ==2025.23
  • ==2025.17
  • ==2025.89
  • ==2025.77
  • ==2025.14
  • ==2025.61
  • ==2025.38
  • ==2025.42
  • ==2025.8
  • ==2025.59
  • ==2025.15
  • ==2025.53
  • ==2025.87
  • ==2025.62
  • ==2025.7
  • ==2025.82
  • ==2025.32
  • ==2025.5
  • ==2025.24
  • ==2025.72
  • ==2025.35
  • ==2025.29
  • ==2025.11
  • ==2025.44
  • ==2025.1
  • ==2025.66
  • ==2025.47
  • ==2025.67
  • ==2025.71
  • ==2025.57
  • ==2025.73
  • ==2025.20
  • ==2025.74
  • ==2025.63
  • ==2025.12
  • ==2025.51
  • ==2025.30
  • ==2025.40
  • ==2025.34
  • ==2025.9
  • ==2025.31
  • ==2025.25
  • ==2025.13
  • ==2025.70
  • ==2025.50
  • ==2025.27
  • ==2025.75
  • ==2025.36
  • ==2025.76
  • ==2025.58
  • ==2025.16
  • ==2025.0
  • ==2025.65
  • ==2025.46
  • ==2025.43
  • ==2025.33
  • ==2025.83
  • ==2025.4
  • ==2025.49

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3739
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 2 weeks ago Activity log
  • Created suggestion
suitenumerique messages ThreadAccess serializers.py ThreadAccessSerializer improper authentication

A security flaw has been discovered in suitenumerique messages 0.2.0. This issue affects the function ThreadAccessSerializer of the file src/backend/core/api/serializers.py of the component ThreadAccess. The manipulation results in improper authentication. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.3.0 is capable of addressing this issue. The patch is identified as d7729f4b885449f6dee3faf8b5f2a05769fb3d6e. The affected component should be upgraded.

Affected products

messages
  • ==0.2.0
  • ==0.3.0

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-3713
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 2 weeks ago Activity log
  • Created suggestion
pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

libpng
  • ==1.6.25
  • ==1.6.35
  • ==1.6.1
  • ==1.6.30
  • ==1.6.29
  • ==1.6.32
  • ==1.6.41
  • ==1.6.46
  • ==1.6.4
  • ==1.6.15
  • ==1.6.0
  • ==1.6.42
  • ==1.6.43
  • ==1.6.2
  • ==1.6.26
  • ==1.6.53
  • ==1.6.6
  • ==1.6.37
  • ==1.6.39
  • ==1.6.50
  • ==1.6.23
  • ==1.6.45
  • ==1.6.22
  • ==1.6.54
  • ==1.6.19
  • ==1.6.48
  • ==1.6.49
  • ==1.6.14
  • ==1.6.18
  • ==1.6.28
  • ==1.6.17
  • ==1.6.24
  • ==1.6.27
  • ==1.6.34
  • ==1.6.38
  • ==1.6.5
  • ==1.6.36
  • ==1.6.40
  • ==1.6.44
  • ==1.6.55
  • ==1.6.33
  • ==1.6.9
  • ==1.6.8
  • ==1.6.52
  • ==1.6.16
  • ==1.6.21
  • ==1.6.20
  • ==1.6.31
  • ==1.6.12
  • ==1.6.47
  • ==1.6.13
  • ==1.6.11
  • ==1.6.10
  • ==1.6.51
  • ==1.6.3
  • ==1.6.7

Matching in nixpkgs

pkgs.libpng

Official reference implementation for the PNG file format with animation patch

Package maintainers

Permalink CVE-2026-30825
0.0 NONE
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 2 weeks ago Activity log
  • Created suggestion
hoppscotch: IDOR - Any authenticated user can revoke any other user's Personal Access Token

hoppscotch is an open source API development ecosystem. Prior to version 2026.2.1, the DELETE /v1/access-tokens/revoke endpoint allows any authenticated user to delete any other user's PAT by providing its ID, with no ownership verification. This issue has been patched in version 2026.2.1.

Affected products

hoppscotch
  • ==< 2026.2.1

Matching in nixpkgs

Package maintainers

created 1 month, 2 weeks ago Activity log
  • Created suggestion
Caddy: vars_regexp double-expands user input, leaking env vars and files

Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, the header value gets resolved once (expected), then passed through repl.ReplaceAll() again (the bug). This means an attacker can put {env.DATABASE_URL} or {file./etc/passwd} in a request header and the server will evaluate it, leaking environment variables, file contents, and system info. This issue has been patched in version 2.11.2.

Affected products

caddy
  • ==>= 2.7.5, < 2.11.2

Matching in nixpkgs

pkgs.caddy

Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS

Package maintainers

Permalink CVE-2026-30832
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 1 month, 2 weeks ago Activity log
  • Created suggestion
Soft Serve: SSRF via unvalidated LFS endpoint in repo import

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.

Affected products

soft-serve
  • ==>= 0.6.0, < 0.11.4

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-29778
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 1 month, 2 weeks ago Activity log
  • Created suggestion
pyLoad: Arbitrary File Write via Path Traversal in edit_package()

pyLoad is a free and open-source download manager written in Python. From version 0.5.0b3.dev13 to 0.5.0b3.dev96, the edit_package() function implements insufficient sanitization for the pack_folder parameter. The current protection relies on a single-pass string replacement of "../", which can be bypassed using crafted recursive traversal sequences. This issue has been patched in version 0.5.0b3.dev97.

Affected products

pyload
  • ==>= 0.5.0b3.dev13, < 0.5.0b3.dev97

Matching in nixpkgs

Package maintainers

created 1 month, 2 weeks ago Activity log
  • Created suggestion
Defuddle: XSS via unescaped string interpolation in _findContentBySchemaText image tag

Defuddle cleans up HTML pages. Prior to version 0.9.0, the _findContentBySchemaText method in src/defuddle.ts interpolates image src and alt attributes directly into an HTML string without escaping. An attacker can use a " in the alt attribute to break out of the attribute context and inject event handler. This issue has been patched in version 0.9.0.

Affected products

defuddle
  • ==< 0.9.0

Matching in nixpkgs

pkgs.defuddle-cli

Command line utility to extract clean html, markdown and metadata from web pages

Package maintainers