Published issues
Permalink
CVE-2026-40293
6.5 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
4 packages
- openfga-cli
- python312Packages.openfga-sdk
- python313Packages.openfga-sdk
- python314Packages.openfga-sdk
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
OpenFGA Playground Preshared Key Exposure
OpenFGA is an authorization/permission engine built for developers. In versions 0.1.4 through 1.13.1, when OpenFGA is configured to use preshared-key authentication with the built-in playground enabled, the local server includes the preshared API key in the HTML response of the /playground endpoint. The /playground endpoint is enabled by default and does not require authentication. It is intended for local development and debugging and is not designed to be exposed to production environments. Only those who run OpenFGA with `--authn-method` preshared, with the playground enabled, and with the playground endpoint accessible beyond localhost or trusted networks are vulnerable. To remediate the issue, users should upgrade to OpenFGA v1.14.0, or disable the playground by running `./openfga run --playground-enabled=false.`
Matching in nixpkgs
High performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar
Ignored packages (4)
Cross-platform CLI to interact with an OpenFGA server
-
-
-
nixos-25.11-small
0.7.8
-
nixpkgs-25.11-darwin
0.7.8
Fine-Grained Authorization solution for Python
-
-
nixos-25.11-small
0.9.5
-
nixpkgs-25.11-darwin
0.9.5
Fine-Grained Authorization solution for Python
-
-
-
nixos-25.11-small
0.9.5
-
nixpkgs-25.11-darwin
0.9.5
Fine-Grained Authorization solution for Python
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
libcoap Out-of-Bounds Read in OSCORE CBOR Unwrap Handling
libcoap contains out-of-bounds read vulnerabilities in OSCORE Appendix B.2 CBOR unwrap handling where get_byte_inc() in src/oscore/oscore_cbor.c relies solely on assert() for bounds checking, which is removed in release builds compiled with NDEBUG. Attackers can send crafted CoAP requests with malformed OSCORE options or responses during OSCORE negotiation to trigger out-of-bounds reads during CBOR parsing and potentially cause heap buffer overflow writes through integer wraparound in allocation size computation.
Matching in nixpkgs
CoAP (RFC 7252) implementation in C
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package pulseaudio-module-xrdp
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
xrdp: RDP MAC signature (dataSignature) never verified on receive — integrity bypass in non-TLS mode
xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not implement verification for the Message Authentication Code (MAC) signature of encrypted RDP packets when using the "Classic RDP Security" layer. While the sender correctly generates signatures, the receiving logic lacks the necessary implementation to validate the 8-byte integrity signature, causing it to be silently ignored. An unauthenticated attacker with man-in-the-middle (MITM) capabilities can exploit this missing check to modify encrypted traffic in transit without detection. It does not affect connections where the TLS security layer is enforced. This issue has been fixed in version 0.10.6. If users are unable to immediately upgrade, they should configure xrdp.ini to enforce TLS security (security_layer=tls) to ensure end-to-end integrity.
Ignored packages (1)
xrdp sink/source pulseaudio modules
-
-
nixpkgs-unstable
0.8
-
nixos-unstable-small
0.8
-
-
nixos-25.11-small
0.8
-
nixpkgs-25.11-darwin
0.8
Permalink
CVE-2026-40341
3.5 LOW
-
CVSS version: 3.1
-
Attack vector (AV): PHYSICAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
libgphoto2 has an OOB Read in ptp_unpack_EOS_FocusInfoEx
libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, an out of bound read in ptp_unpack_EOS_FocusInfoEx could be used to crash libgphoto2 when processing input from untrusted USB devices. Commit c385b34af260595dfbb5f9329526be5158985987 contains a patch. No known workarounds are available.
Matching in nixpkgs
Library for accessing digital cameras
Permalink
CVE-2026-28224
8.2 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird Null Pointer Dereference via CryptCallback causes DOS
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server's IP and port can exploit this to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 3.0.0, < 3.0.14
-
==>= 5.0.0, < 5.0.4
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
Permalink
CVE-2026-34232
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird: DoS via `op_response` packet from client
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the xdr_status_vector() function does not handle the isc_arg_cstring type when decoding an op_response packet, causing a server crash when one is encountered in the status vector. An unauthenticated attacker can exploit this by sending a crafted op_response packet to the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 3.0.0, < 3.0.14
-
==>= 5.0.0, < 5.0.4
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird server hangs when using specific clumplet on batch creation
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the ClumpletReader::getClumpletSize() function can overflow the totalLength value when parsing a Wide type clumplet, causing an infinite loop. An authenticated user with INSERT privileges on any table can exploit this via a crafted Batch Parameter Block to cause a denial of service against the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 3.0.0, < 3.0.14
-
==>= 5.0.0, < 5.0.4
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
Permalink
CVE-2026-40335
5.2 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): PHYSICAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): LOW
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
libgphoto2 has OOB read in ptp_unpack_DPV() UINT128/INT128 handling in ptp-pack.c
libgphoto2 is a camera access and control library. Versions up to and including 2.5.33 have an out-of-bounds read in `ptp_unpack_DPV()` in `camlibs/ptp2/ptp-pack.c` (lines 622–629). The UINT128 and INT128 cases advance `*offset += 16` without verifying that 16 bytes remain in the buffer. The entry check at line 609 only guarantees `*offset < total` (at least 1 byte available), leaving up to 15 bytes unvalidated. Commit 433bde9888d70aa726e32744cd751d7dbe94379a patches the issue.
Matching in nixpkgs
Library for accessing digital cameras
Permalink
CVE-2026-40342
10.0 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird: Path Traversal + Arbitrary File Write Leads to Remote Code Execution
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on the filesystem via path traversal. The library's initialization code executes immediately during loading, before Firebird validates the module, achieving code execution as the server's OS account. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 5.0.0, < 5.0.4
-
==< 3.0.14
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6
Permalink
CVE-2026-35215
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 3 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 4 days ago
-
@LeSuisse
ignored
package firebird-emu
1 week, 3 days ago
-
@LeSuisse
accepted
1 week, 3 days ago
-
@LeSuisse
published on GitHub
1 week, 3 days ago
Firebird: DoS via malicious slice descriptor in slice packet
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the sdl_desc() function does not validate the length of a decoded SDL descriptor from a slice packet. A zero-length descriptor is later used to calculate the number of slice items, causing a division by zero. An unauthenticated attacker can exploit this by sending a crafted slice packet to crash the server. This issue has been fixed in versions 5.0.4, 4.0.7 and 3.0.14.
Affected products
firebird
-
==>= 4.0.0, < 4.0.7
-
==>= 3.0.0, < 3.0.14
-
==>= 5.0.0, < 5.0.4
Matching in nixpkgs
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
SQL relational database management system
SQL relational database management system
-
-
-
nixos-25.11-small
4.0.6
-
nixpkgs-25.11-darwin
4.0.6
Ignored packages (1)
Third-party multi-platform emulator of the ARM-based TI-Nspire™ calculators
-
-
nixpkgs-unstable
1.6
-
nixos-unstable-small
1.6
-
-
nixos-25.11-small
1.6
-
nixpkgs-25.11-darwin
1.6