Nixpkgs security tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-62291
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 packages
    • strongswanNM
    • strongswanTNC
    • strongswanTPM
    • networkmanager_strongswan
  • @LeSuisse dismissed
In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a …

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

Affected products

strongSwan
  • <6.0.3

Matching in nixpkgs

Ignored packages (4)
Current stable branch has never been impacted.

https://github.com/NixOS/nixpkgs/commit/d8a0ae9d79b2914faf8864c94e552211284094c5
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse dismissed
Lack of Authentication in the InputManager D-Bus interface

Lack of authorization of the InputManager D-Bus interface in InputPlumber versions before v0.63.0 can lead to local Denial-of-Service, information leak or even privilege escalation in the context of the currently active user session.

Affected products

inputplumber
  • <0.63.0

Matching in nixpkgs

Package maintainers

Unstable and current stable branches are never been impacted by this issue.
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse dismissed
Polkit authentication dis isabled by default in inputplumber

Polkit authentication dis isabled by default and a race condition in the Polkit authorization check in versions before v0.69.0 can lead to the same issues as in CVE-2025-66005.

Affected products

inputplumber
  • <0.63.0

Matching in nixpkgs

Package maintainers

Unstable and current stable branches are never been impacted by this issue.
Permalink CVE-2026-23744
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    29 packages
    • inspector
    • appium-inspector
    • rubyPackages.gh_inspector
    • perlPackages.ClassInspector
    • haskellPackages.hs-inspector
    • rubyPackages_3_1.gh_inspector
    • rubyPackages_3_2.gh_inspector
    • rubyPackages_3_3.gh_inspector
    • rubyPackages_3_4.gh_inspector
    • rubyPackages_3_5.gh_inspector
    • perl538Packages.ClassInspector
    • perl540Packages.ClassInspector
    • python312Packages.apkinspector
    • python313Packages.apkinspector
    • haskellPackages.amazonka-inspector
    • python312Packages.debian-inspector
    • python313Packages.debian-inspector
    • haskellPackages.amazonka-inspector2
    • kdePackages.accessibility-inspector
    • python312Packages.container-inspector
    • python313Packages.container-inspector
    • python312Packages.mypy-boto3-inspector
    • python313Packages.mypy-boto3-inspector
    • python312Packages.mypy-boto3-inspector2
    • python313Packages.mypy-boto3-inspector2
    • python312Packages.types-aiobotocore-inspector
    • python313Packages.types-aiobotocore-inspector
    • python312Packages.types-aiobotocore-inspector2
    • python313Packages.types-aiobotocore-inspector2
  • @LeSuisse dismissed
REC in MCPJam inspector due to HTTP Endpoint exposes

MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.

Affected products

inspector
  • ==<= 1.4.2
Ignored packages (29)

pkgs.inspector

Gtk4 Libadwaita wrapper for various system info cli commands

Impacted software not present in nixpkgs
Permalink CVE-2026-0696
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    23 packages
    • mopsa
    • sipsak
    • sharpsat-td
    • purescript-psa
    • svndumpsanitizer
    • phpPackages.psalm
    • ocamlPackages.mopsa
    • php82Packages.psalm
    • php83Packages.psalm
    • php84Packages.psalm
    • haskellPackages.cpsa
    • python312Packages.tapsaff
    • python313Packages.tapsaff
    • nodePackages.purescript-psa
    • python312Packages.markupsafe
    • python312Packages.psautohint
    • python313Packages.markupsafe
    • python313Packages.psautohint
    • terraform-providers.vpsadmin
    • nodePackages_latest.purescript-psa
    • python312Packages.types-markupsafe
    • python313Packages.types-markupsafe
    • terraform-providers.vpsfreecz_vpsadmin
  • @LeSuisse dismissed
Session Cookies Missing HttpOnly Attribute

In ConnectWise PSA versions older than 2026.1, certain session cookies were not set with the HttpOnly attribute. In some scenarios, this could allow client-side scripts access to session cookie values.

Affected products

PSA
  • ==All versions prior to 2026.1
Ignored packages (23)

pkgs.mopsa

A Modular and Open Platform for Static Analysis using Abstract Interpretation

  • nixos-unstable 1.1
    • nixpkgs-unstable 1.1
    • nixos-unstable-small 1.1

pkgs.svndumpsanitizer

Alternative to svndumpfilter that discovers which nodes should actually be kept

pkgs.ocamlPackages.mopsa

Modular and Open Platform for Static Analysis using Abstract Interpretation

  • nixos-unstable 1.1
    • nixpkgs-unstable 1.1
    • nixos-unstable-small 1.1
Impacted software not present in nixpkgs
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • perlPackages.NetCUPS
    • perl538Packages.NetCUPS
    • perl540Packages.NetCUPS
  • @LeSuisse dismissed
A missing encryption of sensitive data vulnerability was found in the UPS settings of ADM

When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certificate verification can allow an attacker able to intercept network traffic between the client and server can perform a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the UPS server configuation. This issue affects ADM: from 4.1.0 through 4.3.3.RKD2, from 5.0.0 through 5.1.0.RN42.

Affected products

UPS
  • =<4.3.3.RKD2
  • =<5.1.0.RN42
Ignored packages (3)
Impacted software not present in nixpkgs
Permalink CVE-2023-0835
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package vscode-extensions.yzane.markdown-pdf
  • @LeSuisse dismissed
markdown-pdf version 11.0.0 allows an external attacker to remotely obtain …

markdown-pdf version 11.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the Markdown content entered by the user.

Affected products

markdown-pdf
  • ==11.0.0
Ignored packages (1)
Impacted software not present in nixpkgs
Permalink CVE-2025-43904
4.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    6 packages
    • slurm-nm
    • slurm-spank-x11
    • slurm-spank-stunnel
    • prometheus-slurm-exporter
    • python312Packages.pyslurm
    • python313Packages.pyslurm
  • @LeSuisse dismissed
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting …

In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting system can allow a Coordinator to promote a user to Administrator.

Affected products

Slurm
  • <24.05.8
  • <23.11.11
  • <24.11.5

Matching in nixpkgs

Ignored packages (6)

pkgs.slurm-nm

Generic network load monitor

Package maintainers

Unstable and current stable have never been impacted.
Permalink CVE-2021-47837
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • python312Packages.markdownify
    • python313Packages.markdownify
  • @LeSuisse dismissed
Markdownify 1.2.0 - Persistent Cross-Site Scripting

Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution.

Affected products

Markdownify
  • ==1.2.0
Ignored packages (2)
Impacted software not present in nixpkgs
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    11 packages
    • python313Packages.beanhub-inbox
    • python312Packages.beanhub-inbox
    • python313Packages.pywinbox
    • python312Packages.pywinbox
    • haskellPackages.rainbox
    • haskellPackages.inbox
    • public-inbox
    • winbox4
    • winbox3
    • winbox
    • linbox
  • @LeSuisse dismissed
Multiple vulnerabilities in Viafirma products

IDOR vulnerability has been found in Viafirma Inbox v4.5.13 that allows any authenticated user without privileges in the application to list all users, access and modify their data. This allows the user's email addresses to be modified and, subsequently, using the password recovery functionality to access the application by impersonating any user, including those with administrative permissions.

Affected products

Inbox
  • ==v4.5.13
Ignored packages (11)

pkgs.linbox

C++ library for exact, high-performance linear algebra

pkgs.winbox

Graphical configuration utility for RouterOS-based devices

  • nixos-unstable 3.43

pkgs.winbox3

Graphical configuration utility for RouterOS-based devices

  • nixos-unstable 3.43
    • nixpkgs-unstable 3.43
    • nixos-unstable-small 3.43

pkgs.python312Packages.pywinbox

Cross-Platform and multi-monitor toolkit to handle rectangular areas and windows box

  • nixos-unstable 0.7
    • nixpkgs-unstable 0.7
    • nixos-unstable-small 0.7

pkgs.python313Packages.pywinbox

Cross-Platform and multi-monitor toolkit to handle rectangular areas and windows box

  • nixos-unstable 0.7
    • nixpkgs-unstable 0.7
    • nixos-unstable-small 0.7
Impacted software not present in nixpkgs