Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 2 weeks, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • python312Packages.pyqwikswitch
    • python313Packages.pyqwikswitch
    • python314Packages.pyqwikswitch
    • home-assistant-component-tests.qwikswitch
    • tests.home-assistant-component-tests.qwikswitch
  • @mweinelt dismissed
Qwik affected by unauthenticated RCE via server$ Deserialization

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.

Affected products

qwik
  • ==< 1.19.1
Ignored packages (5)
Not in nixpkgs
Permalink CVE-2026-3389
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • squirrel-sql
    • squirreldisk
    • vimPlugins.nvim-treesitter-parsers.squirrel
  • @LeSuisse dismissed
Squirrel sqstdrex.cpp sqstd_rex_newnode null pointer dereference

A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Squirrel
  • ==3.0
  • ==3.2
  • ==3.1
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-3388
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • squirrel-sql
    • squirreldisk
    • vimPlugins.nvim-treesitter-parsers.squirrel
  • @LeSuisse dismissed
Squirrel sqcompiler.cpp UnaryOP recursion

A vulnerability was found in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion. The attack needs to be approached locally. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Squirrel
  • ==3.0
  • ==3.2
  • ==3.1
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-3390
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • lilypond
    • lilypond-unstable
    • lilypond-with-fonts
    • openlilylib-fonts.ross
    • gnomeExtensions.lilypad
    • openlilylib-fonts.haydn
    • openlilylib-fonts.bravura
    • openlilylib-fonts.cadence
    • openlilylib-fonts.gonville
    • openlilylib-fonts.lilyjazz
    • openlilylib-fonts.paganini
    • openlilylib-fonts.profondo
    • openlilylib-fonts.beethoven
    • openlilylib-fonts.improviso
    • openlilylib-fonts.scorlatti
    • lilypond-unstable-with-fonts
    • openlilylib-fonts.lilyboulez
    • openlilylib-fonts.sebastiano
    • openlilylib-fonts.lv-goldenage
    • openlilylib-fonts.gutenberg1939
  • @LeSuisse dismissed
FascinatedBox lily Error Reporting lily_build_error.c patch_line_end out-of-bounds

A vulnerability was identified in FascinatedBox lily up to 2.3. This issue affects the function patch_line_end of the file src/lily_build_error.c of the component Error Reporting. The manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lily
  • ==2.1
  • ==2.0
  • ==2.2
  • ==2.3
Ignored packages (20)
Not present in nixpkgs
Permalink CVE-2026-3392
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • lilypond
    • lilypond-unstable
    • lilypond-with-fonts
    • openlilylib-fonts.ross
    • gnomeExtensions.lilypad
    • openlilylib-fonts.haydn
    • openlilylib-fonts.bravura
    • openlilylib-fonts.cadence
    • openlilylib-fonts.gonville
    • openlilylib-fonts.lilyjazz
    • openlilylib-fonts.paganini
    • openlilylib-fonts.profondo
    • openlilylib-fonts.beethoven
    • openlilylib-fonts.improviso
    • openlilylib-fonts.scorlatti
    • lilypond-unstable-with-fonts
    • openlilylib-fonts.lilyboulez
    • openlilylib-fonts.sebastiano
    • openlilylib-fonts.lv-goldenage
    • openlilylib-fonts.gutenberg1939
  • @LeSuisse dismissed
FascinatedBox lily lily_emitter.c eval_tree null pointer dereference

A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lily
  • ==2.1
  • ==2.0
  • ==2.2
  • ==2.3
Ignored packages (20)
Not present in nixpkgs
Permalink CVE-2026-3385
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • fairywren
    • tree-sitter-grammars.tree-sitter-wren
    • python313Packages.tree-sitter-grammars.tree-sitter-wren
    • python314Packages.tree-sitter-grammars.tree-sitter-wren
  • @LeSuisse dismissed
wren-lang wren wren_compiler.c resolveLocal recursion

A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

wren
  • ==0.3
  • ==0.2
  • ==0.1
  • ==0.4.0
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-3386
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • fairywren
    • tree-sitter-grammars.tree-sitter-wren
    • python313Packages.tree-sitter-grammars.tree-sitter-wren
    • python314Packages.tree-sitter-grammars.tree-sitter-wren
  • @LeSuisse dismissed
wren-lang wren wren_compiler.c emitOp out-of-bounds

A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

wren
  • ==0.3
  • ==0.2
  • ==0.1
  • ==0.4.0
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-3387
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • fairywren
    • tree-sitter-grammars.tree-sitter-wren
    • python313Packages.tree-sitter-grammars.tree-sitter-wren
    • python314Packages.tree-sitter-grammars.tree-sitter-wren
  • @LeSuisse dismissed
wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereference

A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

wren
  • ==0.3
  • ==0.2
  • ==0.1
  • ==0.4.0
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2026-3391
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • lilypond
    • lilypond-unstable
    • lilypond-with-fonts
    • openlilylib-fonts.ross
    • gnomeExtensions.lilypad
    • openlilylib-fonts.haydn
    • openlilylib-fonts.bravura
    • openlilylib-fonts.cadence
    • openlilylib-fonts.gonville
    • openlilylib-fonts.lilyjazz
    • openlilylib-fonts.paganini
    • openlilylib-fonts.profondo
    • openlilylib-fonts.beethoven
    • openlilylib-fonts.improviso
    • openlilylib-fonts.scorlatti
    • lilypond-unstable-with-fonts
    • openlilylib-fonts.lilyboulez
    • openlilylib-fonts.sebastiano
    • openlilylib-fonts.lv-goldenage
    • openlilylib-fonts.gutenberg1939
  • @LeSuisse dismissed
FascinatedBox lily lily_emitter.c clear_storages out-of-bounds

A security flaw has been discovered in FascinatedBox lily up to 2.3. Impacted is the function clear_storages of the file src/lily_emitter.c. The manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lily
  • ==2.1
  • ==2.0
  • ==2.2
  • ==2.3
Ignored packages (20)
Not present in nixpkgs
Permalink CVE-2025-47379
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Affected products

Snapdragon
  • ==WCN3990
  • ==G1 Gen 1
  • ==Snapdragon X35 5G Modem-RF System
  • ==FastConnect 7800
  • ==QCA6797AQ
  • ==WSA8830
  • ==SM7675
  • ==SM7550
  • ==SM6650P
  • ==SA8620P
  • ==WSA8840
  • ==QCM5430
  • ==LeMansAU
  • ==Snapdragon 660 Mobile Platform
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCN9012
  • ==Snapdragon Auto 5G Modem-RF
  • ==QCS2290
  • ==AR8035
  • ==WCD9390
  • ==WSA8815
  • ==QRB5165M
  • ==CSRA6640
  • ==SM8650Q
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==Snapdragon 480 5G Mobile Platform
  • ==FWA Gen 3 Ultra Platform
  • ==Snapdragon X53 5G Modem-RF System
  • ==SA8155
  • ==Snapdragon 690 5G Mobile Platform
  • ==SDA660
  • ==SM7675P
  • ==WCN6450
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==SA8770P
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCD9380
  • ==WCN3680B
  • ==WCD9371
  • ==FastConnect 6800
  • ==QFW7124
  • ==QCA6174A
  • ==SA7775P
  • ==SA8145P
  • ==WSA8835
  • ==LeMans_AU_LGIT
  • ==QCA9377
  • ==CSRA6620
  • ==WCD9378
  • ==Snapdragon X12 LTE Modem
  • ==WSA8845H
  • ==WCN3950
  • ==SA8155P
  • ==QCN6274
  • ==QCM6490
  • ==Snapdragon XR2 5G Platform
  • ==Flight RB5 5G Platform
  • ==MDM9250
  • ==QCA6564
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==QAM8255P
  • ==WCN3660B
  • ==SM8635P
  • ==Snapdragon 778G 5G Mobile Platform
  • ==SA6155
  • ==5G Fixed Wireless Access Platform
  • ==WCN6650
  • ==QCA8337
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==QCA6595
  • ==SRV1M
  • ==QAMSRV1M
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==WCD9370
  • ==WCD9360
  • ==SA7255P
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==WCD9340
  • ==QCC710
  • ==WCD9375
  • ==SA8195P
  • ==QCA6574
  • ==QCS8550
  • ==Snapdragon X75 5G Modem-RF System
  • ==SRV1H
  • ==QCA6698AU
  • ==WCN3988
  • ==FastConnect 6700
  • ==Robotics RB2 Platform
  • ==SA8150P
  • ==QCA8081
  • ==C-V2X 9150
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM7550P
  • ==Snapdragon 695 5G Mobile Platform
  • ==WSA8845
  • ==QCA6696
  • ==WSA8810
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SM6225P
  • ==SA6145P
  • ==SD865 5G
  • ==WCD9395
  • ==WCN3980
  • ==QCN6224
  • ==SA9000P
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==Snapdragon 865 5G Mobile Platform
  • ==WCD9341
  • ==WCD9335
  • ==QCM4325
  • ==QCA6564A
  • ==QEP8111
  • ==FastConnect 6200
  • ==QCA6698AQ
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WSA8832
  • ==WCN6755
  • ==Snapdragon 460 Mobile Platform
  • ==SM8635
  • ==Milos
  • ==QCA6574A
  • ==QCA6574AU
  • ==QCA6688AQ
  • ==Snapdragon 662 Mobile Platform
  • ==WCN3910
  • ==Snapdragon 888+ 5G Mobile Platform
  • ==SW5100P
  • ==FastConnect 6900
  • ==SA4155P
  • ==SA2150P
  • ==Snapdragon 782G Mobile Platform
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QAM8295P
  • ==Robotics RB5 Platform
  • ==QAMSRV1H
  • ==QCA2066
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SW5100
  • ==Snapdragon X55 5G Modem-RF System
  • ==QCA8695AU
  • ==Snapdragon 870 5G Mobile Platform
  • ==WCN3615
  • ==QCA6595AU
  • ==SnapdragonAuto 4GModem
  • ==Snapdragon 888 5G Mobile Platform
  • ==QCM2290
  • ==SA8255P
  • ==Snapdragon X72 5G Modem-RF System
  • ==Snapdragon X32 5G Modem-RF System
  • ==QCA6678AQ
  • ==SA4150P
  • ==SM8550P
  • ==QCA6564AU
  • ==Snapdragon 778G+ 5G Mobile Platform
  • ==WCD9385
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==QRB5165N
  • ==Qualcomm 215 Mobile Platform
  • ==SD662
  • ==QFW7114
  • ==SA6155P
  • ==MDM9628
  • ==SM7635P
  • ==QCA9367
  • ==SM7325P
  • ==QCA6584AU
  • ==WCD9326
  • ==QCN9011
  • ==SA8295P
  • ==QCS4290
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCA6391
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==AR8031
  • ==SA6150P
  • ==Smart Audio 400 Platform
  • ==QCM6125
Ignored packages (1)
Not present in nixpkgs