Nixpkgs security tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-21281
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • python312Packages.bincopy
    • python313Packages.bincopy
  • @LeSuisse dismissed
InCopy | Heap-based Buffer Overflow (CWE-122)

InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Affected products

InCopy
  • =<19.5.5
Ignored packages (2)

pkgs.python312Packages.bincopy

Mangling of various file formats that conveys binary information (Motorola S-Record, Intel HEX, TI-TXT, ELF and binary files)

pkgs.python313Packages.bincopy

Mangling of various file formats that conveys binary information (Motorola S-Record, Intel HEX, TI-TXT, ELF and binary files)

Impacted software not present in nixpkgs
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • python313Packages.pan-os-python
    • python312Packages.pan-os-python
  • @LeSuisse dismissed
PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

Affected products

PAN-OS
  • <11.1.13, 11.1.10-h9, 11.1.6-h23, 11.1.4-h27
  • <10.1.14-h20
  • <12.1.4, 12.1.3-h3
  • <11.2.10-h2, 11.2.7-h8, 11.2.4-h15
  • <10.2.18-h1, 10.2.16-h6, 10.2.13-h18, 10.2.10-h30, 10.2.7-h32
Cloud NGFW
  • ==All
Prisma Access
  • <10.2.10-h29
  • <10.2.10-h29, 10.2.4-h43
  • <11.2.7-h8
Ignored packages (2)
Software not present in nixpkgs
Permalink CVE-2025-14822
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • python312Packages.mattermostdriver
    • python313Packages.mattermostdriver
    • mattermost-desktop
  • @LeSuisse dismissed
DoS from quadratic complexity in model.ParseHashtags

Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens

Affected products

Mattermost
  • ==11.2.0
  • =<10.11.8
  • ==10.11.9

Matching in nixpkgs

pkgs.mattermost

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

pkgs.mattermostLatest

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

Ignored packages (3)

Package maintainers

Already fixed in unstable and stable branches.
Permalink CVE-2025-14435
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • python312Packages.mattermostdriver
    • python313Packages.mattermostdriver
    • mattermost-desktop
    • mattermostLatest
    • mattermost
  • @LeSuisse restored
    2 packages
    • mattermostLatest
    • mattermost
  • @LeSuisse dismissed
Application-Level DoS via infinite re-render loop in user profile handling

Mattermost versions 10.11.x <= 10.11.8, 11.1.x <= 11.1.1, 11.0.x <= 11.0.6 fail to prevent infinite re-renders on API errors which allows authenticated users to cause application-level DoS via triggering unbounded component re-render loops.

Affected products

Mattermost
  • =<10.11.8
  • ==11.1.2
  • ==10.11.9
  • ==11.2.0
  • =<11.0.6
  • ==11.0.7
  • =<11.1.1

Matching in nixpkgs

pkgs.mattermost

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

pkgs.mattermostLatest

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

Ignored packages (3)

Package maintainers

Already fixed in unstable and stable branches.
Permalink CVE-2025-31186
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    12 packages
    • xcodes
    • xcodegen
    • xcode-install
    • rubyPackages.xcodeproj
    • rubyPackages_3_1.xcodeproj
    • rubyPackages_3_2.xcodeproj
    • rubyPackages_3_3.xcodeproj
    • rubyPackages_3_4.xcodeproj
    • rubyPackages_3_5.xcodeproj
    • darwin.xcodeProjectCheckHook
    • python312Packages.latexcodec
    • python313Packages.latexcodec
  • @LeSuisse dismissed
A permissions issue was addressed with additional restrictions. This issue …

A permissions issue was addressed with additional restrictions. This issue is fixed in Xcode 16.3. An app may be able to bypass Privacy preferences.

Affected products

Xcode
  • <16.3
Ignored packages (12)

pkgs.xcodes

Command-line tool to install and switch between multiple versions of Xcode

pkgs.xcodegen

Swift command line tool for generating your Xcode project

Unfree, more recent versions are already available
Permalink CVE-2026-1061
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • tmsu
    • commitmsgfmt
  • @LeSuisse dismissed
xiweicheng TMS FileController.java upload unrestricted upload

A vulnerability was detected in xiweicheng TMS up to 2.28.0. Affected by this issue is the function Upload of the file src/main/java/com/lhjz/portal/controller/FileController.java. The manipulation of the argument filename results in unrestricted upload. The attack may be performed from remote. The exploit is now public and may be used.

Affected products

TMS
  • ==2.0
  • ==2.18
  • ==2.26
  • ==2.15
  • ==2.12
  • ==2.17
  • ==2.7
  • ==2.24
  • ==2.14
  • ==2.27
  • ==2.28.0
  • ==2.16
  • ==2.8
  • ==2.20
  • ==2.11
  • ==2.10
  • ==2.23
  • ==2.2
  • ==2.5
  • ==2.9
  • ==2.22
  • ==2.19
  • ==2.4
  • ==2.6
  • ==2.3
  • ==2.13
  • ==2.25
  • ==2.21
  • ==2.1
Ignored packages (2)

pkgs.commitmsgfmt

Formats commit messages better than fmt(1) and Vim

Impacted software is not present in nixpkgs
Permalink CVE-2026-1062
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    2 packages
    • tmsu
    • commitmsgfmt
  • @LeSuisse dismissed
xiweicheng TMS HtmlUtil.java summary server-side request forgery

A flaw has been found in xiweicheng TMS up to 2.28.0. This affects the function Summary of the file src/main/java/com/lhjz/portal/util/HtmlUtil.java. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used.

Affected products

TMS
  • ==2.0
  • ==2.18
  • ==2.26
  • ==2.15
  • ==2.12
  • ==2.17
  • ==2.7
  • ==2.24
  • ==2.14
  • ==2.27
  • ==2.28.0
  • ==2.16
  • ==2.8
  • ==2.20
  • ==2.11
  • ==2.10
  • ==2.23
  • ==2.2
  • ==2.5
  • ==2.9
  • ==2.22
  • ==2.19
  • ==2.4
  • ==2.6
  • ==2.3
  • ==2.13
  • ==2.25
  • ==2.21
  • ==2.1
Ignored packages (2)

pkgs.commitmsgfmt

Formats commit messages better than fmt(1) and Vim

Impacted software is not present in nixpkgs
Permalink CVE-2026-1059
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    5 packages
    • dockapps.wmsm-app
    • dockapps.wmsystemtray
    • python312Packages.pywmspro
    • python313Packages.pywmspro
    • home-assistant-component-tests.wmspro
  • @LeSuisse dismissed
FeMiner wms chkuser.php sql injection

A security vulnerability has been detected in FeMiner wms up to 9cad1f1b179a98b9547fd003c23b07c7594775fa. Affected by this vulnerability is an unknown functionality of the file /src/chkuser.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

wms
  • ==9cad1f1b179a98b9547fd003c23b07c7594775fa
Ignored packages (5)
Impacted software is not present in nixpkgs
Permalink CVE-2025-15532
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse dismissed
Open5GS Timer resource consumption

A security flaw has been discovered in Open5GS up to 2.7.5. This issue affects some unknown processing of the component Timer Handler. The manipulation results in resource consumption. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The patch is identified as c7c131f8d2cb1195ada5e0e691b6868ebcd8a845. It is best practice to apply a patch to resolve this issue.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Current stable was never affected

https://github.com/NixOS/nixpkgs/commit/f66adc76c1ad6cd711af7267eea214e09e9515ee
Permalink CVE-2025-15530
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse dismissed
Open5GS s11-handler.c assertion

A vulnerability was determined in Open5GS up to 2.7.6. This affects the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c. Executing a manipulation can lead to reachable assertion. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Current stable was never affected https://github.com/NixOS/nixpkgs/commit/f66adc76c1ad6cd711af7267eea214e09e9515ee