CVE-2025-15537 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): updated an hour ago by @LeSuisse Activity log Created automatic suggestion 17 hours ago @LeSuisse removed 2 packages python312Packages.python-mapnik python313Packages.python-mapnik an hour ago Mapnik dbfile.cpp string_value heap-based overflow A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. Affected products Mapnik ==4.1 ==4.2.0 ==4.0 Matching in nixpkgs pkgs.mapnik Open source toolkit for developing mapping applications nixos-unstable 4.1.4 nixpkgs-unstable 4.1.4 nixos-unstable-small 4.1.4 nixos-25.05 4.0.7 nixos-25.05-small 4.0.7 nixpkgs-25.05-darwin 4.0.7 Package maintainers: 9 @autra Augustin Trancart <augustin.trancart@gmail.com> @hummeltech David Hummel <hummeltech@sherpaguru.com> @willcohen Will Cohen @l0b0 Victor Engmark <victor@engmark.name> @nialov Nikolas Ovaskainen <nikolasovaskainen@gmail.com> @imincik Ivan Mincik <ivan.mincik@gmail.com> @sikmir Nikolay Korotkiy <sikmir@disroot.org> @hrdinka Christoph Hrdinka <c.nix@hrdinka.at> @nh2 Niklas Hambüchen <mail@nh2.me>
pkgs.mapnik Open source toolkit for developing mapping applications nixos-unstable 4.1.4 nixpkgs-unstable 4.1.4 nixos-unstable-small 4.1.4 nixos-25.05 4.0.7 nixos-25.05-small 4.0.7 nixpkgs-25.05-darwin 4.0.7
CVE-2025-15539 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): updated an hour ago by @LeSuisse Activity log Created automatic suggestion 17 hours ago @LeSuisse removed package open5gs-webui an hour ago Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed. Affected products Open5GS ==2.7.6 ==2.7.4 ==2.7.5 ==2.7.2 ==2.7.1 ==2.7.3 ==2.7.0 Matching in nixpkgs pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2 Package maintainers: 2 @Bot-wxt1221 Bot-wxt1221 <3264117476@qq.com> @xddxdd Yuhui Xu <b980120@hotmail.com>
pkgs.open5gs 4G/5G core network components nixos-unstable 2.7.6 nixpkgs-unstable 2.7.6 nixos-unstable-small 2.7.6 nixos-25.05 2.7.2 nixos-25.05-small 2.7.2 nixpkgs-25.05-darwin 2.7.2
CVE-2025-15533 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): created 17 hours ago raysan5 raylib rtext.c GenImageFontAtlas heap-based overflow A vulnerability was determined in raysan5 raylib up to 909f040. Affected by this vulnerability is the function GenImageFontAtlas of the file src/rtext.c. Executing a manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. This patch is called 5a3391fdce046bc5473e52afbd835dd2dc127146. Applying a patch is advised to resolve this issue. Affected products raylib ==909f040 Matching in nixpkgs pkgs.raylib Simple and easy-to-use library to enjoy videogames programming nixos-unstable 5.5 nixpkgs-unstable 5.5 nixos-unstable-small 5.5 nixos-25.05 5.5 nixos-25.05-small 5.5 nixpkgs-25.05-darwin 5.5 pkgs.raylib-games Collection of games made with raylib nixos-unstable 2022-10-24 nixpkgs-unstable 2022-10-24 nixos-unstable-small 2022-10-24 nixos-25.05 2022-10-24 nixos-25.05-small 2022-10-24 nixpkgs-25.05-darwin 2022-10-24 pkgs.ocamlPackages.raylib OCaml bindings for Raylib (5.0.0) nixos-unstable 1.4.0 nixpkgs-unstable 1.4.0 nixos-unstable-small 1.4.0 pkgs.haskellPackages.h-raylib Raylib bindings for Haskell nixos-unstable 5.5.3.1 nixpkgs-unstable 5.5.3.1 nixos-unstable-small 5.5.3.1 nixos-25.05 5.5.2.1 nixos-25.05-small 5.5.2.1 nixpkgs-25.05-darwin 5.5.2.1 pkgs.python312Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2 pkgs.python313Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2 Package maintainers: 4 @Sigmanificient Yohann Boniface <sigmanificient@gmail.com> @diniamo diniamo <diniamo53@gmail.com> @ehmry Emery Hemingway <ehmry@posteo.net> @r17x Rin <hi@rin.rocks>
pkgs.raylib Simple and easy-to-use library to enjoy videogames programming nixos-unstable 5.5 nixpkgs-unstable 5.5 nixos-unstable-small 5.5 nixos-25.05 5.5 nixos-25.05-small 5.5 nixpkgs-25.05-darwin 5.5
pkgs.raylib-games Collection of games made with raylib nixos-unstable 2022-10-24 nixpkgs-unstable 2022-10-24 nixos-unstable-small 2022-10-24 nixos-25.05 2022-10-24 nixos-25.05-small 2022-10-24 nixpkgs-25.05-darwin 2022-10-24
pkgs.ocamlPackages.raylib OCaml bindings for Raylib (5.0.0) nixos-unstable 1.4.0 nixpkgs-unstable 1.4.0 nixos-unstable-small 1.4.0
pkgs.haskellPackages.h-raylib Raylib bindings for Haskell nixos-unstable 5.5.3.1 nixpkgs-unstable 5.5.3.1 nixos-unstable-small 5.5.3.1 nixos-25.05 5.5.2.1 nixos-25.05-small 5.5.2.1 nixpkgs-25.05-darwin 5.5.2.1
pkgs.python312Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2
pkgs.python313Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2
CVE-2025-15535 3.3 LOW CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): created 17 hours ago nicbarker clay clay.h Clay__MeasureTextCached null pointer dereference A security flaw has been discovered in nicbarker clay up to 0.14. This affects the function Clay__MeasureTextCached in the library clay.h. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. Affected products clay ==0.10 ==0.1 ==0.11 ==0.7 ==0.8 ==0.2 ==0.4 ==0.12 ==0.14 ==0.13 ==0.9 ==0.3 ==0.5 ==0.6 Matching in nixpkgs pkgs.haskellPackages.clay CSS preprocessor as embedded Haskell nixos-unstable 0.16.1 nixpkgs-unstable 0.16.1 nixos-unstable-small 0.16.1 nixos-25.05 0.15.0 nixos-25.05-small 0.15.0 nixpkgs-25.05-darwin 0.15.0 pkgs.haskellPackages.doclayout A prettyprinting library for laying out text documents nixos-unstable 0.5.0.1 nixpkgs-unstable 0.5.0.1 nixos-unstable-small 0.5.0.1 nixos-25.05 0.5 nixos-25.05-small 0.5 nixpkgs-25.05-darwin 0.5 pkgs.haskellPackages.hslua-module-doclayout Lua module wrapping Text.DocLayout. nixos-unstable 1.2.0.1 nixpkgs-unstable 1.2.0.1 nixos-unstable-small 1.2.0.1 nixos-25.05 1.2.0 nixos-25.05-small 1.2.0 nixpkgs-25.05-darwin 1.2.0 pkgs.typstPackages.paris-saclay-thesis-flat_1_0_2 An unofficial, flat-design template for Paris-Saclay University theses nixos-unstable 1.0.2 nixpkgs-unstable 1.0.2 nixos-unstable-small 1.0.2 nixos-25.05 1.0.2 nixos-25.05-small 1.0.2 nixpkgs-25.05-darwin 1.0.2 Package maintainers: 1 @cherrypiejam Gongqi Huang
pkgs.haskellPackages.clay CSS preprocessor as embedded Haskell nixos-unstable 0.16.1 nixpkgs-unstable 0.16.1 nixos-unstable-small 0.16.1 nixos-25.05 0.15.0 nixos-25.05-small 0.15.0 nixpkgs-25.05-darwin 0.15.0
pkgs.haskellPackages.doclayout A prettyprinting library for laying out text documents nixos-unstable 0.5.0.1 nixpkgs-unstable 0.5.0.1 nixos-unstable-small 0.5.0.1 nixos-25.05 0.5 nixos-25.05-small 0.5 nixpkgs-25.05-darwin 0.5
pkgs.haskellPackages.hslua-module-doclayout Lua module wrapping Text.DocLayout. nixos-unstable 1.2.0.1 nixpkgs-unstable 1.2.0.1 nixos-unstable-small 1.2.0.1 nixos-25.05 1.2.0 nixos-25.05-small 1.2.0 nixpkgs-25.05-darwin 1.2.0
pkgs.typstPackages.paris-saclay-thesis-flat_1_0_2 An unofficial, flat-design template for Paris-Saclay University theses nixos-unstable 1.0.2 nixpkgs-unstable 1.0.2 nixos-unstable-small 1.0.2 nixos-25.05 1.0.2 nixos-25.05-small 1.0.2 nixpkgs-25.05-darwin 1.0.2
CVE-2026-0863 8.5 HIGH CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): HIGH Privileges required (PR): LOW User interaction (UI): NONE Scope (S): CHANGED Confidentiality impact (C): HIGH Integrity impact (I): HIGH Availability impact (A): HIGH created 17 hours ago Sandbox escape in n8n Python task runner allows for arbitrary code execution on the underlying host. Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact. Affected products n8n <2.4.2 <1.123.14 <2.3.5 Matching in nixpkgs pkgs.n8n Free and source-available fair-code licensed workflow automation tool nixos-unstable 1.119.2 nixpkgs-unstable 1.119.2 nixos-unstable-small 1.119.2 nixos-25.05 1.91.3 nixos-25.05-small 1.91.3 nixpkgs-25.05-darwin 1.91.3 Package maintainers: 1 @gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
pkgs.n8n Free and source-available fair-code licensed workflow automation tool nixos-unstable 1.119.2 nixpkgs-unstable 1.119.2 nixos-unstable-small 1.119.2 nixos-25.05 1.91.3 nixos-25.05-small 1.91.3 nixpkgs-25.05-darwin 1.91.3
CVE-2025-15538 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): created 17 hours ago Open Asset Import Library Assimp LWOMaterial.cpp FindUVChannels use after free A security vulnerability has been detected in Open Asset Import Library Assimp up to 6.0.2. Affected by this vulnerability is the function Assimp::LWOImporter::FindUVChannels of the file /src/assimp/code/AssetLib/LWO/LWOMaterial.cpp. Such manipulation leads to use after free. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. This and similar defects are tracked and handled via issue #6128. Affected products Assimp ==6.0.2 ==6.0.0 ==6.0.1 Matching in nixpkgs pkgs.assimp Library to import various 3D model formats nixos-unstable 6.0.2 nixpkgs-unstable 6.0.2 nixos-unstable-small 6.0.2 nixos-25.05 5.4.3 nixos-25.05-small 5.4.3 nixpkgs-25.05-darwin 5.4.3 Package maintainers: 1 @ehmry Emery Hemingway <ehmry@posteo.net>
pkgs.assimp Library to import various 3D model formats nixos-unstable 6.0.2 nixpkgs-unstable 6.0.2 nixos-unstable-small 6.0.2 nixos-25.05 5.4.3 nixos-25.05-small 5.4.3 nixpkgs-25.05-darwin 5.4.3
CVE-2025-15534 5.3 MEDIUM CVSS version: 3.1 Attack vector (AV): Attack complexity (AC): Privileges required (PR): User interaction (UI): Scope (S): Confidentiality impact (C): Integrity impact (I): Availability impact (A): created 17 hours ago raysan5 raylib rtext.c LoadFontData integer overflow A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue. Affected products raylib ==909f040 Matching in nixpkgs pkgs.raylib Simple and easy-to-use library to enjoy videogames programming nixos-unstable 5.5 nixpkgs-unstable 5.5 nixos-unstable-small 5.5 nixos-25.05 5.5 nixos-25.05-small 5.5 nixpkgs-25.05-darwin 5.5 pkgs.raylib-games Collection of games made with raylib nixos-unstable 2022-10-24 nixpkgs-unstable 2022-10-24 nixos-unstable-small 2022-10-24 nixos-25.05 2022-10-24 nixos-25.05-small 2022-10-24 nixpkgs-25.05-darwin 2022-10-24 pkgs.ocamlPackages.raylib OCaml bindings for Raylib (5.0.0) nixos-unstable 1.4.0 nixpkgs-unstable 1.4.0 nixos-unstable-small 1.4.0 pkgs.haskellPackages.h-raylib Raylib bindings for Haskell nixos-unstable 5.5.3.1 nixpkgs-unstable 5.5.3.1 nixos-unstable-small 5.5.3.1 nixos-25.05 5.5.2.1 nixos-25.05-small 5.5.2.1 nixpkgs-25.05-darwin 5.5.2.1 pkgs.python312Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2 pkgs.python313Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2 Package maintainers: 4 @Sigmanificient Yohann Boniface <sigmanificient@gmail.com> @diniamo diniamo <diniamo53@gmail.com> @ehmry Emery Hemingway <ehmry@posteo.net> @r17x Rin <hi@rin.rocks>
pkgs.raylib Simple and easy-to-use library to enjoy videogames programming nixos-unstable 5.5 nixpkgs-unstable 5.5 nixos-unstable-small 5.5 nixos-25.05 5.5 nixos-25.05-small 5.5 nixpkgs-25.05-darwin 5.5
pkgs.raylib-games Collection of games made with raylib nixos-unstable 2022-10-24 nixpkgs-unstable 2022-10-24 nixos-unstable-small 2022-10-24 nixos-25.05 2022-10-24 nixos-25.05-small 2022-10-24 nixpkgs-25.05-darwin 2022-10-24
pkgs.ocamlPackages.raylib OCaml bindings for Raylib (5.0.0) nixos-unstable 1.4.0 nixpkgs-unstable 1.4.0 nixos-unstable-small 1.4.0
pkgs.haskellPackages.h-raylib Raylib bindings for Haskell nixos-unstable 5.5.3.1 nixpkgs-unstable 5.5.3.1 nixos-unstable-small 5.5.3.1 nixos-25.05 5.5.2.1 nixos-25.05-small 5.5.2.1 nixpkgs-25.05-darwin 5.5.2.1
pkgs.python312Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2
pkgs.python313Packages.raylib-python-cffi Python CFFI bindings for Raylib nixos-unstable 5.5.0.3 nixpkgs-unstable 5.5.0.3 nixos-unstable-small 5.5.0.3 nixos-25.05 5.5.0.2 nixos-25.05-small 5.5.0.2 nixpkgs-25.05-darwin 5.5.0.2
CVE-2025-62230 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 4 weeks ago Xorg: xwayland: use-after-free in xkb client resource removal A flaw was discovered in the X.Org X server’s X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect. Affected products tigervnc * xwayland <24.1.9 xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
CVE-2025-62231 7.3 HIGH CVSS version: 3.1 Attack vector (AV): LOCAL Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): HIGH Integrity impact (I): LOW Availability impact (A): HIGH created 1 month, 4 weeks ago Xorg: xmayland: value overflow in xkbsetcompatmap() A flaw was identified in the X.Org X server’s X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash. Affected products tigervnc * xwayland <24.1.9 xorg-x11-server * xorg-x11-server-Xwayland * Matching in nixpkgs pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
pkgs.tigervnc Fork of tightVNC, made in cooperation with VirtualGL nixos-unstable 1.15.0 nixpkgs-unstable 1.15.0 nixos-unstable-small 1.15.0 nixos-25.05 1.14.0 nixos-25.05-small 1.14.0 nixpkgs-25.05-darwin 1.14.0
CVE-2025-54941 4.6 MEDIUM CVSS version: 3.1 Attack vector (AV): NETWORK Attack complexity (AC): LOW Privileges required (PR): LOW User interaction (UI): REQUIRED Scope (S): UNCHANGED Confidentiality impact (C): LOW Integrity impact (I): LOW Availability impact (A): NONE created 1 month, 4 weeks ago Apache Airflow: Command injection in "example_dag_decorator" An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly. Affected products apache-airflow << 3.0.5 Matching in nixpkgs pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3 Package maintainers: 3 @ingenieroariel Ariel Nunez <ariel@nunez.co> @bhipple Benjamin Hipple <bhipple@protonmail.com> @gbpdt Graham Bennett <nix@pdtpartners.com>
pkgs.apache-airflow Programmatically author, schedule and monitor data pipelines nixos-unstable 2.7.3 nixpkgs-unstable 2.7.3 nixos-unstable-small 2.7.3 nixos-25.05 2.7.3 nixos-25.05-small 2.7.3 nixpkgs-25.05-darwin 2.7.3