Published issues
Permalink
CVE-2026-40253
6.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
openCryptoki: Memory safety vulnerabilities in BER/DER decoders in asn1.c
openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. In versions 3.26.0 and below, the BER/DER decoding functions in the shared common library (asn1.c) accept a raw pointer but no buffer length parameter, and trust attacker-controlled BER length fields without validating them against actual buffer boundaries. All primitive decoders are affected: ber_decode_INTEGER, ber_decode_SEQUENCE, ber_decode_OCTET_STRING, ber_decode_BIT_STRING, and ber_decode_CHOICE. Additionally, ber_decode_INTEGER can produce integer underflows when the encoded length is zero. An attacker supplying a malformed BER-encoded cryptographic object through PKCS#11 operations such as C_CreateObject or C_UnwrapKey, token loading from disk, or remote backend communication can trigger out-of-bounds reads. This affects all token backends (Soft, ICA, CCA, TPM, EP11, ICSF) since the vulnerable code is in the shared common library. A patch is available thorugh commit ed378f463ef73364c89feb0fc923f4dc867332a3.
Matching in nixpkgs
PKCS#11 implementation for Linux
Permalink
CVE-2026-40170
7.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): NONE
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
package ngtcp2-gnutls
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
ngtcp2 has a qlog transport parameter serialization stack buffer overflow
ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabled, a remote peer can send sufficiently large transport parameters during the QUIC handshake to cause writes beyond the buffer boundary, resulting in a stack buffer overflow. This affects deployments that enable the qlog callback and process untrusted peer transport parameters. This issue has been fixed in version 1.22.1. If developers are unable to immediately upgrade, they can disable the qlog on client.
Matching in nixpkgs
Implementation of the QUIC protocol (RFC9000)
Ignored packages (1)
Effort to implement RFC9000 QUIC protocol
Permalink
CVE-2026-40318
8.5 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
SiYuan: Publish Reader Path Traversal Delete via `removeUnusedAttributeView`
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enforcement. An attacker can inject path traversal sequences such as ../ into the id value to escape the intended directory and delete arbitrary .json files on the server, including global configuration files and workspace metadata. This issue has been fixed in version 3.6.4.
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
Permalink
CVE-2026-41035
7.4 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): LOW
-
Availability impact (A): LOW
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
19 packages
- grsync
- rrsync
- rsyncy
- btrsync
- parsync
- librsync
- diskrsync
- openrsync
- vdirsyncer
- sqlite-rsync
- yaziPlugins.rsync
- python313Packages.btrsync
- python314Packages.btrsync
- python312Packages.sysrsync
- python313Packages.sysrsync
- python314Packages.sysrsync
- python312Packages.vdirsyncer
- python313Packages.vdirsyncer
- python314Packages.vdirsyncer
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted …
In rsync 3.0.1 through 3.4.1, receive_xattr relies on an untrusted length value during a qsort call, leading to a receiver use-after-free. The victim must run rsync with -X (aka --xattrs). On Linux, many (but not all) common configurations are vulnerable. Non-Linux platforms are more widely vulnerable.
Matching in nixpkgs
Fast incremental file transfer utility
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Ignored packages (19)
Synchronize folders, files and make backups
-
-
-
nixos-25.11-small
1.3.1
-
nixpkgs-25.11-darwin
1.3.1
Helper to run rsync-only environments from ssh-logins
-
-
-
nixos-25.11-small
3.4.1
-
nixpkgs-25.11-darwin
3.4.1
Progress bar wrapper for rsync
-
-
-
nixos-25.11-small
2.2.0
-
nixpkgs-25.11-darwin
2.2.0
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Tool to parallel rsync-like pull sync over SSH
Implementation of the rsync remote-delta algorithm
-
-
-
nixos-25.11-small
2.3.4
-
nixpkgs-25.11-darwin
2.3.4
Rsync for block devices and disk images
-
-
-
nixos-25.11-small
1.3.0
-
nixpkgs-25.11-darwin
1.3.0
BSD-licensed implementation of rsync
Synchronize calendars and contacts
Database remote-copy tool for SQLite
Simple rsync plugin for yazi file manager
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Btrfs replication made easy
-
-
nixpkgs-unstable
0.3
-
nixos-unstable-small
0.3
Simple and safe system's rsync wrapper for Python
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
-
-
-
nixos-25.11-small
1.1.1
-
nixpkgs-25.11-darwin
1.1.1
Simple and safe system's rsync wrapper for Python
Synchronize calendars and contacts
Synchronize calendars and contacts
Synchronize calendars and contacts
Permalink
CVE-2026-40322
9.1 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
SiYuan: Mermaid `javascript:` Link Injection Leads to Stored XSS and Electron RCE
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-controlled javascript: URLs in Mermaid code blocks to survive into the rendered output. On desktop builds using Electron, windows are created with nodeIntegration enabled and contextIsolation disabled, escalating the stored XSS to arbitrary code execution when a victim opens a note containing a malicious Mermaid block and clicks the rendered diagram node. This issue has been fixed in version 3.6.4.
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
Permalink
CVE-2026-40505
3.3 LOW
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
10 packages
- python312Packages.pymupdf
- python313Packages.pymupdf
- python314Packages.pymupdf
- python312Packages.pymupdf4llm
- python313Packages.pymupdf4llm
- python314Packages.pymupdf4llm
- zathuraPkgs.zathura_pdf_mupdf
- python312Packages.pymupdf-fonts
- python313Packages.pymupdf-fonts
- python314Packages.pymupdf-fonts
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
MuPDF mutool ANSI Injection via Metadata
MuPDF mutool does not sanitize PDF metadata fields before writing them to terminal output, allowing attackers to inject arbitrary ANSI escape sequences through crafted PDF metadata. Attackers can embed malicious ANSI escape codes in PDF metadata that are passed unsanitized to the terminal when running mutool info, enabling them to clear the terminal display and render arbitrary text for social engineering attacks such as presenting fake prompts or spoofed commands.
Affected products
MuPDF
-
<0f17d789fe8c29b41e47663be82514aaca3a4dfb
Matching in nixpkgs
Lightweight PDF, XPS, and E-book viewer and toolkit written in portable C
Lightweight PDF, XPS, and E-book viewer and toolkit written in portable C
Ignored packages (10)
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
Python bindings for MuPDF's rendering library
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
PyMuPDF Utilities for LLM/RAG - converts PDF pages to Markdown format for Retrieval-Augmented Generation
Zathura PDF plugin (mupdf)
-
-
-
nixos-25.11-small
0.4.4
-
nixpkgs-25.11-darwin
0.4.4
Collection of optional fonts for PyMuPDF
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
-
-
-
nixos-25.11-small
1.0.5
-
nixpkgs-25.11-darwin
1.0.5
Collection of optional fonts for PyMuPDF
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
Apache Airflow: JWT token appearing in logs
JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors.
Users are advised to upgrade to Airflow version that contains fix.
Users are recommended to upgrade to version 3.2.0, which fixes this issue.
Matching in nixpkgs
Platform to programmatically author, schedule and monitor workflows
-
-
-
nixos-25.11-small
2.7.3
-
nixpkgs-25.11-darwin
2.7.3
Permalink
CVE-2026-40259
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
SiYuan: Publish Reader Can Arbitrarily Delete Attribute View Files via removeUnusedAttributeView API
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler passes a caller-controlled id directly to a model function that unconditionally deletes the corresponding attribute view file from the workspace without verifying that the caller has write privileges or that the target attribute view is actually unused. An authenticated publish-service reader can permanently delete arbitrary attribute view definitions by extracting publicly exposed data-av-id values from published content, causing breakage of database views and workspace rendering until manually restored. This issue has been fixed in version 3.6.4.
Affected products
siyuan
-
==< 0.0.0-20260407035653-2f416e5253f1
-
==< 3.6.4
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
SiYuan: Incomplete sanitization of bazaar README allows stored XSS via iframe srcdoc (incomplete fix for CVE-2026-33066)
SiYuan is an open-source personal knowledge management system. In versions 3.6.1 through 3.6.3, a prior fix for XSS in bazaar README rendering (incomplete fix for CVE-2026-33066) enabled the Lute HTML sanitizer, but the sanitizer does not block iframe tags, and its URL-prefix blocklist does not effectively filter srcdoc attributes which contain raw HTML rather than URLs. A malicious bazaar package author can include an iframe with a srcdoc attribute containing embedded scripts in their README. When other users view the package in SiYuan's marketplace UI, the payload executes in the Electron context with full application privileges, enabling arbitrary code execution on the user's machine. This issue has been fixed in version 3.6.4.
Matching in nixpkgs
Privacy-first personal knowledge management system that supports complete offline usage, as well as end-to-end encrypted data sync
-
-
-
nixos-25.11-small
3.6.2
-
nixpkgs-25.11-darwin
3.6.2
Permalink
CVE-2026-40959
9.3 CRITICAL
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): LOW
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
2 packages
- luanti-client
- luanti-server
1 week, 5 days ago
-
@LeSuisse
ignored
3 maintainers
1 week, 5 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
Luanti 5 before 5.15.2, when LuaJIT is used, allows a …
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.
Matching in nixpkgs
Open source voxel game engine (formerly Minetest)
Ignored packages (2)
Open source voxel game engine (formerly Minetest)
Open source voxel game engine (formerly Minetest)
Package maintainers
Ignored maintainers (3)