Nixpkgs security tracker

Login with GitHub

Published issues

All published security issues are tracked and resolved on GitHub.

NIXPKGS-2026-1367
published on
Permalink CVE-2026-7536
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Open5GS BSF pcfBindings bsf_sess_add_by_ip_address denial of service

A vulnerability was determined in Open5GS up to 2.7.7. This vulnerability affects the function bsf_sess_add_by_ip_address of the file /nbsf-management/v1/pcfBindings of the component BSF. Executing a manipulation of the argument ipv4Addr can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1366
published on
Permalink CVE-2026-7598
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
libssh2 userauth.c userauth_password integer overflow

A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauth_password of the file src/userauth.c. Such manipulation of the argument username_len/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.

Affected products

libssh2
  • ==1.11.0
  • ==1.11.1

Matching in nixpkgs

Ignored packages (3)

Package maintainers

NIXPKGS-2026-1365
published on
Permalink CVE-2026-7587
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Open5GS AMF nsmf-handler.c amf_nsmf_pdusession_handle_update_sm_context denial of service

A vulnerability has been found in Open5GS up to 2.7.7. This vulnerability affects the function amf_nsmf_pdusession_handle_update_sm_context of the file /src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1364
published on
Permalink CVE-2026-7585
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Open5GS AMF nudm-handler.c amf_nudm_sdm_handle_provisioned denial of service

A vulnerability was determined in Open5GS up to 2.7.7. The impacted element is the function amf_nudm_sdm_handle_provisioned of the file /src/amf/nudm-handler.c of the component AMF. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1363
published on
Permalink CVE-2026-7580
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection

A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: "[J]ust to be safe, probably never happen".

Affected products

Exiftool
  • ==13.52
  • ==13.36
  • ==13.35
  • ==13.34
  • ==13.48
  • ==13.42
  • ==13.33
  • ==13.19
  • ==13.38
  • ==13.45
  • ==13.39
  • ==13.46
  • ==13.30
  • ==13.0
  • ==13.37
  • ==13.14
  • ==13.43
  • ==13.51
  • ==13.29
  • ==13.25
  • ==13.54
  • ==13.18
  • ==13.16
  • ==13.3
  • ==13.21
  • ==13.12
  • ==13.13
  • ==13.11
  • ==13.9
  • ==13.24
  • ==13.28
  • ==13.6
  • ==13.26
  • ==13.32
  • ==13.4
  • ==13.15
  • ==13.17
  • ==13.50
  • ==13.31
  • ==13.44
  • ==13.49
  • ==13.23
  • ==13.7
  • ==13.40
  • ==13.20
  • ==13.2
  • ==13.22
  • ==13.10
  • ==13.8
  • ==13.5
  • ==13.53
  • ==13.27
  • ==13.41
  • ==13.47
  • ==13.1

Matching in nixpkgs

pkgs.exiftool

Tool to read, write and edit EXIF meta information

Ignored packages (7)

Package maintainers

NIXPKGS-2026-1362
published on
Permalink CVE-2026-43506
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 20 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • prosody-filer
    • jitsi-meet-prosody
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …

An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5. A Denial of Service can occur via memory exhaustion caused by memory leaks from unauthenticated connections.

Affected products

Prosody
  • <0.12.6
  • <13.0.5

Matching in nixpkgs

Ignored packages (2)
NIXPKGS-2026-1361
published on
Permalink CVE-2026-7518
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Open5GS AMF SBI Endpoint sdmsubscription-notify amf_namf_callback_handle_sdm_data_change_notify denial of service

A flaw has been found in Open5GS up to 2.7.7. This issue affects the function amf_namf_callback_handle_sdm_data_change_notify of the file /namf-callback/v1/{id}/sdmsubscription-notify of the component AMF SBI Endpoint. This manipulation of the argument changeItem.newValue causes denial of service. The attack can be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Ignored packages (1)

Package maintainers

NIXPKGS-2026-1360
published on
Permalink CVE-2026-43504
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 20 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • prosody-filer
    • jitsi-meet-prosody
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …

An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5, when mod_proxy65 is enabled. Because mod_proxy65 mishandles access control in a paused scenario, relaying of unauthenticated traffic can occur.

Affected products

Prosody
  • <0.12.6
  • <13.0.5

Matching in nixpkgs

Ignored packages (2)
NIXPKGS-2026-1359
published on
Permalink CVE-2026-43507
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 20 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored reference https://b…
  • @LeSuisse ignored
    2 packages
    • prosody-filer
    • jitsi-meet-prosody
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
An issue was discovered in Prosody before 0.12.6 and 1.0.0 …

An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5. A Denial of Service can occur via memory exhaustion caused by XML parsing resource amplification from unauthenticated connections.

Affected products

Prosody
  • <0.12.6
  • <13.0.5

Matching in nixpkgs

Ignored packages (2)
NIXPKGS-2026-1358
published on
Permalink CVE-2026-7583
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 20 hours ago by @LeSuisse Activity log
Open5GS BSF context.c bsf_sess_find_by_ipv6prefix denial of service

A flaw has been found in Open5GS up to 2.7.7. This issue affects the function bsf_sess_find_by_ipv6prefix of the file /src/bsf/context.c of the component BSF. This manipulation of the argument ipv6Prefix causes denial of service. It is possible to initiate the attack remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Ignored packages (1)

Package maintainers