Published issues
Permalink
CVE-2026-41082
7.3 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): HIGH
-
Availability impact (A): LOW
updated 14 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
ignored
23 packages
- dopamine
- opam2json
- opam-publish
- opam-installer
- ocamlPackages.opam-core
- ocamlPackages.opam-state
- ocamlPackages.opam-client
- ocamlPackages.opam-format
- ocamlPackages.opam-solver
- ocamlPackages.opam-repository
- ocamlPackages.opam-file-format
- ocamlPackages_latest.opam-core
- ocamlPackages_latest.opam-state
- ocamlPackages.opam-0install-cudf
- ocamlPackages_latest.opam-client
- ocamlPackages_latest.opam-format
- ocamlPackages_latest.opam-solver
- ocamlPackages_latest.opam-repository
- ocamlPackages_latest.opam-file-format
- tree-sitter-grammars.tree-sitter-opam
- ocamlPackages_latest.opam-0install-cudf
- python313Packages.tree-sitter-grammars.tree-sitter-opam
- python314Packages.tree-sitter-grammars.tree-sitter-opam
23 minutes ago
-
@LeSuisse
accepted
23 minutes ago
-
@LeSuisse
published on GitHub
14 minutes ago
In OCaml opam before 2.5.1, a .install field containing a …
In OCaml opam before 2.5.1, a .install field containing a destination filepath can use ../ to reach a parent directory.
Matching in nixpkgs
Package manager for OCaml
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Ignored packages (23)
Audio player that keeps it simple
-
-
-
nixos-25.11-small
3.0.0
-
nixpkgs-25.11-darwin
3.0.0
Convert opam file syntax to JSON
-
-
nixpkgs-unstable
0.4
-
nixos-unstable-small
0.4
-
-
nixos-25.11-small
0.4
-
nixpkgs-25.11-darwin
0.4
Tool to ease contributions to opam repositories
-
-
-
nixos-25.11-small
2.7.0
-
nixpkgs-25.11-darwin
2.7.0
Handle (un)installation from opam install files
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Small standard library extensions, and generic system interaction modules used by opam
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
OPAM development library handling the ~/.opam hierarchy, repository and switch states
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Actions on the opam root, switches, installations, and front-end
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
This library is based on the Cudf and Dose libraries, and handles calls to the external solver from opam
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
OPAM repository and remote sources handling, including curl/wget, rsync, git, mercurial, darcs backends
-
-
-
nixos-25.11-small
2.4.1
-
nixpkgs-25.11-darwin
2.4.1
Small standard library extensions, and generic system interaction modules used by opam
OPAM development library handling the ~/.opam hierarchy, repository and switch states
Opam solver using 0install backend using the CUDF interface
Actions on the opam root, switches, installations, and front-end
This library is based on the Cudf and Dose libraries, and handles calls to the external solver from opam
OPAM repository and remote sources handling, including curl/wget, rsync, git, mercurial, darcs backends
Tree-sitter grammar for opam
Opam solver using 0install backend using the CUDF interface
Python bindings for tree-sitter-opam
Python bindings for tree-sitter-opam
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
ignored
reference https://g…
23 minutes ago
-
@LeSuisse
ignored
10 packages
- capypdf
- python312Packages.pypdf2
- python312Packages.pypdf3
- python313Packages.pypdf2
- python313Packages.pypdf3
- python314Packages.pypdf2
- python314Packages.pypdf3
- python312Packages.pypdfium2
- python313Packages.pypdfium2
- python314Packages.pypdfium2
23 minutes ago
-
@LeSuisse
accepted
23 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
pypdf: Manipulated XMP metadata entity declarations can exhaust RAM
pypdf is a free and open-source pure-python PDF library. In versions prior to 6.10.0, manipulated XMP metadata entity declarations can exhaust RAM. An attacker who exploits this vulnerability can craft a PDF which leads to large memory usage. This requires parsing the XMP metadata. This issue has been fixed in version 6.10.0.
Matching in nixpkgs
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
-
-
nixos-25.11-small
6.9.2
-
nixpkgs-25.11-darwin
6.9.2
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
-
-
-
nixos-25.11-small
6.9.2
-
nixpkgs-25.11-darwin
6.9.2
Pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files
Ignored packages (10)
Fully color managed PDF generation library
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Pure-Python library built as a PDF toolkit
Python bindings to PDFium
Python bindings to PDFium
Python bindings to PDFium
Permalink
CVE-2026-40253
6.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
accepted
22 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
openCryptoki: Memory safety vulnerabilities in BER/DER decoders in asn1.c
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but no buffer length parameter, and trust attacker-controlled BER length fields without validating them against actual buffer boundaries. All primitive decoders are affected: ber_decode_INTEGER, ber_decode_SEQUENCE, ber_decode_OCTET_STRING, ber_decode_BIT_STRING, and ber_decode_CHOICE. Additionally, ber_decode_INTEGER can produce integer underflows when the encoded length is zero. An attacker supplying a malformed BER-encoded cryptographic object through PKCS#11 operations such as C_CreateObject or C_UnwrapKey, token loading from disk, or remote backend communication can trigger out-of-bounds reads. This affects all token backends (Soft, ICA, CCA, TPM, EP11, ICSF) since the vulnerable code is in the shared common library. A patch is available thorugh commit ed378f463ef73364c89feb0fc923f4dc867332a3.
Matching in nixpkgs
PKCS#11 implementation for Linux
Permalink
CVE-2026-40170
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
ignored
package ngtcp2-gnutls
22 minutes ago
-
@LeSuisse
accepted
22 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
ngtcp2 has a qlog transport parameter serialization stack buffer overflow
ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabled, a remote peer can send sufficiently large transport parameters during the QUIC handshake to cause writes beyond the buffer boundary, resulting in a stack buffer overflow. This affects deployments that enable the qlog callback and process untrusted peer transport parameters. This issue has been fixed in version 1.22.1. If developers are unable to immediately upgrade, they can disable the qlog on client.
Matching in nixpkgs
Implementation of the QUIC protocol (RFC9000)
Ignored packages (1)
Effort to implement RFC9000 QUIC protocol
Permalink
CVE-2026-40318
8.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
accepted
21 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
Permalink
CVE-2026-41035
7.4 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
ignored
reference https://g…
20 minutes ago
-
@LeSuisse
ignored
19 packages
- grsync
- rrsync
- rsyncy
- btrsync
- parsync
- librsync
- diskrsync
- openrsync
- vdirsyncer
- sqlite-rsync
- yaziPlugins.rsync
- python313Packages.btrsync
- python314Packages.btrsync
- python312Packages.sysrsync
- python313Packages.sysrsync
- python314Packages.sysrsync
- python312Packages.vdirsyncer
- python313Packages.vdirsyncer
- python314Packages.vdirsyncer
20 minutes ago
-
@LeSuisse
accepted
20 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted …
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
Matching in nixpkgs
Fast incremental file transfer utility
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Ignored packages (19)
Synchronize folders, files and make backups
-
-
-
nixos-25.11-small
1.3.1
-
nixpkgs-25.11-darwin
1.3.1
Helper to run rsync-only environments from ssh-logins
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Progress bar wrapper for rsync
-
-
-
nixos-25.11-small
2.2.0
-
nixpkgs-25.11-darwin
2.2.0
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Tool to parallel rsync-like pull sync over SSH
Implementation of the rsync remote-delta algorithm
-
-
-
nixos-25.11-small
2.3.4
-
nixpkgs-25.11-darwin
2.3.4
Rsync for block devices and disk images
-
-
-
nixos-25.11-small
1.3.0
-
nixpkgs-25.11-darwin
1.3.0
BSD-licensed implementation of rsync
Synchronize calendars and contacts
Database remote-copy tool for SQLite
Simple rsync plugin for yazi file manager
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Simple and safe system's rsync wrapper for Python
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
-
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
Synchronize calendars and contacts
Synchronize calendars and contacts
Synchronize calendars and contacts
Permalink
CVE-2026-40322
9.1 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
accepted
20 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
SiYuan: Mermaid `javascript:` Link Injection Leads to Stored XSS and Electron RCE
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-controlled javascript: URLs in Mermaid code blocks to survive into the rendered output. On desktop builds using Electron, windows are created with nodeIntegration enabled and contextIsolation disabled, escalating the stored XSS to arbitrary code execution when a victim opens a note containing a malicious Mermaid block and clicks the rendered diagram node. This issue has been fixed in version 3.6.4.
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
Permalink
CVE-2026-40505
3.3 LOW
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
ignored
10 packages
- python312Packages.pymupdf
- python313Packages.pymupdf
- python314Packages.pymupdf
- python312Packages.pymupdf4llm
- python313Packages.pymupdf4llm
- python314Packages.pymupdf4llm
- zathuraPkgs.zathura_pdf_mupdf
- python312Packages.pymupdf-fonts
- python313Packages.pymupdf-fonts
- python314Packages.pymupdf-fonts
20 minutes ago
-
@LeSuisse
accepted
19 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
MuPDF mutool ANSI Injection via Metadata
MuPDF mutool does not sanitize PDF metadata fields before writing them to terminal output, allowing attackers to inject arbitrary ANSI escape sequences through crafted PDF metadata. Attackers can embed malicious ANSI escape codes in PDF metadata that are passed unsanitized to the terminal when running mutool info, enabling them to clear the terminal display and render arbitrary text for social engineering attacks such as presenting fake prompts or spoofed commands.
Affected products
MuPDF
-
<0f17d789fe8c29b41e47663be82514aaca3a4dfb
Matching in nixpkgs
Lightweight PDF, XPS, and E-book viewer and toolkit written in portable C
Lightweight PDF, XPS, and E-book viewer and toolkit written in portable C
Ignored packages (10)
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
Zathura PDF plugin (mupdf)
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Collection of optional fonts for PyMuPDF
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
-
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
accepted
19 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
Apache Airflow: JWT token appearing in logs
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors.
Users are advised to upgrade to Airflow version that contains fix.
Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
Permalink
CVE-2026-40259
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated 15 minutes ago
by @LeSuisse
Activity log
-
Created automatic suggestion
9 hours ago
-
@LeSuisse
accepted
19 minutes ago
-
@LeSuisse
published on GitHub
15 minutes ago
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via removeUnusedAttributeView API
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directly to a model function that unconditionally deletes the corresponding attribute view file from the workspace without verifying that the caller has write privileges or that the target attribute view is actually unused. An authenticated publish-service reader can permanently delete arbitrary attribute view definitions by extracting publicly exposed data-av-id values from published content, causing breakage of database views and workspace rendering until manually restored. This issue has been fixed in version 3.6.4.
Affected products
siyuan
-
==< 0.0.0-20260407035653-2f416e5253f1
-
==< 3.6.4
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2