Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-21385
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Integer Overflow or Wraparound in Graphics

Memory corruption while using alignments for memory allocation.

Affected products

Snapdragon
  • ==WCN3990
  • ==G1 Gen 1
  • ==Palawan25
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==IQ8 Series Platform
  • ==FastConnect 7800
  • ==SDM429W
  • ==QXM1083
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==QCA6797AQ
  • ==Pandeiro
  • ==SM7435
  • ==WSA8830
  • ==SM7675
  • ==SM7550
  • ==SM6650P
  • ==SA8620P
  • ==WSA8840
  • ==QCM5430
  • ==LeMansAU
  • ==QXM1096
  • ==Snapdragon 660 Mobile Platform
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==Vision Intelligence 400 Platform
  • ==SAR2230P
  • ==QCN9012
  • ==Snapdragon 625 Mobile Platform
  • ==Snapdragon Auto 5G Modem-RF
  • ==QCS2290
  • ==AR8035
  • ==WCD9390
  • ==WSA8815
  • ==QCS4490
  • ==CSRA6640
  • ==QRB5165M
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==SM8650Q
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==QLN1083BD
  • ==Snapdragon 480 5G Mobile Platform
  • ==Snapdragon 820Am
  • ==QCN6024
  • ==Snapdragon X53 5G Modem-RF System
  • ==WCN7861
  • ==SA8155
  • ==Snapdragon 690 5G Mobile Platform
  • ==SDA660
  • ==SM7675P
  • ==WCN6450
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==SA8770P
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCD9380
  • ==WCN3680B
  • ==WCD9371
  • ==FastConnect 6800
  • ==QCA6174A
  • ==SA7775P
  • ==SA8145P
  • ==WSA8835
  • ==LeMans_AU_LGIT
  • ==QCA9377
  • ==CSRA6620
  • ==WCD9378
  • ==Snapdragon X12 LTE Modem
  • ==QXM1086
  • ==Snapdragon 8 Elite Gen 5
  • ==WCN3950
  • ==WSA8845H
  • ==SA8155P
  • ==QCM6490
  • ==Snapdragon XR2 5G Platform
  • ==Flight RB5 5G Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==MDM9250
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCN3660B
  • ==QAM8255P
  • ==QPA1083BD
  • ==SXR2230P
  • ==SM8635P
  • ==Snapdragon 778G 5G Mobile Platform
  • ==QMP1000
  • ==5G Fixed Wireless Access Platform
  • ==SA6155
  • ==WCN6650
  • ==QCA8337
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==QCA6595
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==SRV1M
  • ==QAMSRV1M
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==QCM4490
  • ==WCD9370
  • ==WCD9360
  • ==SA7255P
  • ==WCN7860
  • ==Vision Intelligence 200 Platform
  • ==WCD9375
  • ==SA8195P
  • ==Netrani
  • ==Snapdragon 8 Elite
  • ==QCA6574
  • ==QCS8550
  • ==SD626
  • ==IQ9 Series Platform
  • ==SRV1H
  • ==Themisto
  • ==QPA1086BD
  • ==SAR2130P
  • ==QCA6698AU
  • ==FSM100 Platform
  • ==WCN3988
  • ==G2 Gen 1
  • ==WCD9330
  • ==FastConnect 6700
  • ==Robotics RB2 Platform
  • ==SA8150P
  • ==QCA8081
  • ==C-V2X 9150
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SXR2250P
  • ==SM7550P
  • ==Snapdragon 695 5G Mobile Platform
  • ==WSA8845
  • ==Smart Display 200 Platform
  • ==Snapdragon 820 Automotive Platform
  • ==QCA6696
  • ==WSA8810
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SXR2330P
  • ==SM6225P
  • ==SA6145P
  • ==QXM1095
  • ==WCN3620
  • ==SD 8 Gen1 5G
  • ==SD865 5G
  • ==WCD9395
  • ==SAR1250P
  • ==WCN3980
  • ==SA9000P
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==Snapdragon 865 5G Mobile Platform
  • ==WCN7880
  • ==WCD9341
  • ==WCD9335
  • ==QCM4325
  • ==SC8380XP
  • ==QCA6564A
  • ==WSA8832
  • ==FastConnect 6200
  • ==QCA6698AQ
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==Vision Intelligence 100 Platform
  • ==Orne
  • ==Snapdragon 460 Mobile Platform
  • ==QXM1093
  • ==SM8635
  • ==WCN6755
  • ==Milos
  • ==QCA6574A
  • ==QCA6574AU
  • ==APQ8098
  • ==QCA6688AQ
  • ==Snapdragon 662 Mobile Platform
  • ==WCN3910
  • ==Snapdragon 888+ 5G Mobile Platform
  • ==SW5100P
  • ==FastConnect 6900
  • ==SA4155P
  • ==Snapdragon 782G Mobile Platform
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QAM8295P
  • ==QAMSRV1H
  • ==Robotics RB5 Platform
  • ==IQ6 Series Platform
  • ==QCA2066
  • ==QLN1086BD
  • ==Snapdragon X5 LTE Modem
  • ==SW6100
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SW5100
  • ==QCN9024
  • ==Snapdragon X55 5G Modem-RF System
  • ==SM8750P
  • ==QCA8695AU
  • ==WCN7881
  • ==Snapdragon 870 5G Mobile Platform
  • ==SDX61
  • ==WCN3615
  • ==SM8475P
  • ==QCA6595AU
  • ==Snapdragon 888 5G Mobile Platform
  • ==QCM2290
  • ==SA8255P
  • ==SW6100P
  • ==QCA6678AQ
  • ==SXR2350P
  • ==SA4150P
  • ==SM8550P
  • ==QCA6564AU
  • ==Snapdragon 778G+ 5G Mobile Platform
  • ==WCD9385
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==SAR1165P
  • ==QRB5165N
  • ==Qualcomm 215 Mobile Platform
  • ==QXM1094
  • ==SD662
  • ==Snapdragon X65 5G Modem-RF System
  • ==SA6155P
  • ==MDM9628
  • ==SM7635P
  • ==Snapdragon 429 Mobile Platform
  • ==QCA9367
  • ==SM7325P
  • ==QCA6584AU
  • ==Snapdragon 626 Mobile Platform
  • ==WCD9326
  • ==QCN9011
  • ==SA8295P
  • ==QCS4290
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCA6391
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==AR8031
  • ==SA6150P
  • ==Monaco_IOT
  • ==Smart Audio 400 Platform
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==QCM6125
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2025-47378
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks, 5 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Exposure of Sensitive System Information to an Unauthorized Control Sphere in HLOS

Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.

Affected products

Snapdragon
  • ==QLN1086BD
  • ==X2000092
  • ==X2000094
  • ==FastConnect 6700
  • ==Snapdragon XR2 5G Platform
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==WCD9378C
  • ==Snapdragon X55 5G Modem-RF System
  • ==FastConnect 7800
  • ==QAM8255P
  • ==QXM1083
  • ==QCA6797AQ
  • ==Pandeiro
  • ==QPA1083BD
  • ==SXR2230P
  • ==SXR2250P
  • ==WSA8830
  • ==WSA8845
  • ==X2000090
  • ==QCA6696
  • ==SA8620P
  • ==WSA8810
  • ==WSA8840
  • ==Snapdragon 870 5G Mobile Platform
  • ==LeMansAU
  • ==QXM1096
  • ==Snapdragon AR1 Gen 1 Platform
  • ==QCA6595AU
  • ==QCA6595
  • ==SAR2230P
  • ==QXM1095
  • ==X2000086
  • ==SD865 5G
  • ==SA8255P
  • ==SRV1M
  • ==Cologne
  • ==QAMSRV1M
  • ==WCD9395
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==SAR1250P
  • ==WSA8815
  • ==XG101039
  • ==XG101032
  • ==X2000077
  • ==WCD9385
  • ==QLN1083BD
  • ==SA9000P
  • ==SAR1165P
  • ==SA7255P
  • ==WCN7861
  • ==QXM1094
  • ==Snapdragon 865 5G Mobile Platform
  • ==WCN7860
  • ==SA8770P
  • ==WSA8832
  • ==WCD9380
  • ==QCA6698AQ
  • ==QXM1093
  • ==FastConnect 6800
  • ==SRV1H
  • ==SA7775P
  • ==QPA1086BD
  • ==SAR2130P
  • ==WSA8835
  • ==LeMans_AU_LGIT
  • ==FastConnect 6900
  • ==QCA6391
  • ==QXM1086
  • ==Snapdragon 8 Elite Gen 5
  • ==WCN3950
  • ==WSA8845H
  • ==QAMSRV1H
  • ==XG101002
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2025-59600
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Buffer Over-read in Graphics

Memory Corruption when adding user-supplied data without checking available buffer space.

Affected products

Snapdragon
  • ==G1 Gen 1
  • ==Palawan25
  • ==IQ8 Series Platform
  • ==FastConnect 7800
  • ==QXM1083
  • ==Pandeiro
  • ==SM7435
  • ==WSA8830
  • ==SM7675
  • ==SM6650P
  • ==SA8620P
  • ==WSA8840
  • ==QCM5430
  • ==LeMansAU
  • ==QXM1096
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==SAR2230P
  • ==QCN9012
  • ==QCS2290
  • ==AR8035
  • ==WCD9390
  • ==WSA8815
  • ==QCS4490
  • ==CSRA6640
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==SM8650Q
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==QLN1083BD
  • ==Snapdragon 480 5G Mobile Platform
  • ==QCN6024
  • ==WCN7861
  • ==SM7675P
  • ==WCN6450
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==SA8770P
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCD9380
  • ==QCA6174A
  • ==SA7775P
  • ==SA8145P
  • ==WSA8835
  • ==LeMans_AU_LGIT
  • ==CSRA6620
  • ==WCD9378
  • ==QXM1086
  • ==Snapdragon 8 Elite Gen 5
  • ==WCN3950
  • ==WSA8845H
  • ==SA8155P
  • ==QCM6490
  • ==Snapdragon XR2 5G Platform
  • ==QAM8255P
  • ==QPA1083BD
  • ==SXR2230P
  • ==SM8635P
  • ==QMP1000
  • ==WCN6650
  • ==QCA8337
  • ==QCA6595
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==SRV1M
  • ==QAMSRV1M
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==QCM4490
  • ==WCD9370
  • ==SA7255P
  • ==WCN7860
  • ==WCD9375
  • ==SA8195P
  • ==Netrani
  • ==Snapdragon 8 Elite
  • ==QCA6574
  • ==QCS8550
  • ==SRV1H
  • ==IQ9 Series Platform
  • ==Themisto
  • ==QPA1086BD
  • ==SAR2130P
  • ==WCN3988
  • ==G2 Gen 1
  • ==FastConnect 6700
  • ==SA8150P
  • ==QCA8081
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SXR2250P
  • ==Snapdragon 695 5G Mobile Platform
  • ==WSA8845
  • ==QCA6696
  • ==WSA8810
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SXR2330P
  • ==SM6225P
  • ==SA6145P
  • ==QXM1095
  • ==SD865 5G
  • ==WCD9395
  • ==SAR1250P
  • ==WCN3980
  • ==SA9000P
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==WCN7880
  • ==WCD9335
  • ==QCM4325
  • ==SC8380XP
  • ==QCA6564A
  • ==WSA8832
  • ==FastConnect 6200
  • ==QCA6698AQ
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WCN6755
  • ==Orne
  • ==Snapdragon 460 Mobile Platform
  • ==QXM1093
  • ==SM8635
  • ==Milos
  • ==QCA6574A
  • ==QCA6574AU
  • ==QCA6688AQ
  • ==Snapdragon 662 Mobile Platform
  • ==WCN3910
  • ==SW5100P
  • ==FastConnect 6900
  • ==SA4155P
  • ==QAMSRV1H
  • ==IQ6 Series Platform
  • ==QCA2066
  • ==QLN1086BD
  • ==SW6100
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SW5100
  • ==QCN9024
  • ==SM8750P
  • ==WCN7881
  • ==SDX61
  • ==QCA6595AU
  • ==QCM2290
  • ==SA8255P
  • ==SW6100P
  • ==SXR2350P
  • ==SA4150P
  • ==QCA6564AU
  • ==WCD9385
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==SAR1165P
  • ==QXM1094
  • ==SD662
  • ==Snapdragon X65 5G Modem-RF System
  • ==SA6155P
  • ==MDM9628
  • ==SM7635P
  • ==QCN9011
  • ==QCS4290
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCA6391
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==AR8031
  • ==SA6150P
  • ==Monaco_IOT
  • ==Smart Audio 400 Platform
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==QCM6125
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2025-47386
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Use After Free in Automotive Audio

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

Affected products

Snapdragon
  • ==WCN3990
  • ==G1 Gen 1
  • ==Snapdragon X35 5G Modem-RF System
  • ==FastConnect 7800
  • ==QCA6797AQ
  • ==WSA8830
  • ==SM7675
  • ==SM7550
  • ==SM6650P
  • ==SA8620P
  • ==WSA8840
  • ==QCM5430
  • ==LeMansAU
  • ==Snapdragon 660 Mobile Platform
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCN9012
  • ==Snapdragon Auto 5G Modem-RF
  • ==QCS2290
  • ==AR8035
  • ==WCD9390
  • ==WSA8815
  • ==QRB5165M
  • ==CSRA6640
  • ==SM8650Q
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==Snapdragon 480 5G Mobile Platform
  • ==FWA Gen 3 Ultra Platform
  • ==Snapdragon X53 5G Modem-RF System
  • ==Snapdragon 690 5G Mobile Platform
  • ==SDA660
  • ==SM7675P
  • ==WCN6450
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==SA8770P
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCD9380
  • ==WCN3680B
  • ==WCD9371
  • ==FastConnect 6800
  • ==QFW7124
  • ==QCA6174A
  • ==SA7775P
  • ==SA8145P
  • ==WSA8835
  • ==LeMans_AU_LGIT
  • ==QCA9377
  • ==CSRA6620
  • ==WCD9378
  • ==Snapdragon X12 LTE Modem
  • ==WSA8845H
  • ==WCN3950
  • ==SA8155P
  • ==QCN6274
  • ==QCM6490
  • ==Snapdragon XR2 5G Platform
  • ==Flight RB5 5G Platform
  • ==MDM9250
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==WCN3660B
  • ==QAM8255P
  • ==SM8635P
  • ==Snapdragon 778G 5G Mobile Platform
  • ==WCN6650
  • ==QCA8337
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==QCA6595
  • ==SRV1M
  • ==QAMSRV1M
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==WCD9370
  • ==SA7255P
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==WCD9340
  • ==QCC710
  • ==WCD9375
  • ==SA8195P
  • ==QCA6574
  • ==QCS8550
  • ==Snapdragon X75 5G Modem-RF System
  • ==SRV1H
  • ==QCA6698AU
  • ==WCN3988
  • ==FastConnect 6700
  • ==Robotics RB2 Platform
  • ==SA8150P
  • ==QCA8081
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM7550P
  • ==Snapdragon 695 5G Mobile Platform
  • ==WSA8845
  • ==QCA6696
  • ==WSA8810
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SM6225P
  • ==SA6145P
  • ==SD865 5G
  • ==WCD9395
  • ==WCN3980
  • ==QCN6224
  • ==SA9000P
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==Snapdragon 865 5G Mobile Platform
  • ==WCD9341
  • ==WCD9335
  • ==QCM4325
  • ==QCA6564A
  • ==QEP8111
  • ==FastConnect 6200
  • ==QCA6698AQ
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WSA8832
  • ==WCN6755
  • ==Snapdragon 460 Mobile Platform
  • ==SM8635
  • ==Milos
  • ==QCA6574A
  • ==QCA6574AU
  • ==QCA6688AQ
  • ==Snapdragon 662 Mobile Platform
  • ==WCN3910
  • ==Snapdragon 888+ 5G Mobile Platform
  • ==SW5100P
  • ==FastConnect 6900
  • ==SA4155P
  • ==Snapdragon 782G Mobile Platform
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QAM8295P
  • ==Robotics RB5 Platform
  • ==QAMSRV1H
  • ==QCA2066
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SW5100
  • ==Snapdragon X55 5G Modem-RF System
  • ==QCA8695AU
  • ==Snapdragon 870 5G Mobile Platform
  • ==WCN3615
  • ==QCA6595AU
  • ==Snapdragon 888 5G Mobile Platform
  • ==QCM2290
  • ==SA8255P
  • ==Snapdragon X72 5G Modem-RF System
  • ==Snapdragon X32 5G Modem-RF System
  • ==QCA6678AQ
  • ==SA4150P
  • ==SM8550P
  • ==QCA6564AU
  • ==Snapdragon 778G+ 5G Mobile Platform
  • ==WCD9385
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==QRB5165N
  • ==Qualcomm 215 Mobile Platform
  • ==SD662
  • ==QFW7114
  • ==SA6155P
  • ==MDM9628
  • ==SM7635P
  • ==QCA9367
  • ==SM7325P
  • ==QCA6584AU
  • ==WCD9326
  • ==QCN9011
  • ==SA8295P
  • ==QCS4290
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCA6391
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==AR8031
  • ==SA6150P
  • ==Smart Audio 400 Platform
  • ==QCM6125
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2026-3400
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 weeks, 6 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vimPlugins.nvim-treesitter-parsers.regex
  • @LeSuisse dismissed
Tenda AC15 TextEditingConversion stack-based overflow

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Affected products

AC15
  • ==15.13.07.0
  • ==15.13.07.5
  • ==15.13.07.9
  • ==15.13.07.4
  • ==15.13.07.10
  • ==15.13.07.1
  • ==15.13.07.11
  • ==15.13.07.12
  • ==15.13.07.3
  • ==15.13.07.2
  • ==15.13.07.13
  • ==15.13.07.8
  • ==15.13.07.7
  • ==15.13.07.6
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2026-27707
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • overseerr
    • jellyseerr
    • python312Packages.python-overseerr
    • python313Packages.python-overseerr
    • python314Packages.python-overseerr
    • home-assistant-component-tests.overseerr
    • tests.home-assistant-component-tests.overseerr
  • @LeSuisse dismissed
Plex-configured Seerr instances vulnerable to unauthenticated account registration via Jellyfin authentication endpoint

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Starting in version 2.0.0 and prior to version 3.1.0, an authentication guard logic flaw in `POST /api/v1/auth/jellyfin` allows an unauthenticated attacker to register a new Seerr account on any Plex-configured instance by authenticating with an attacker-controlled Jellyfin server. The attacker receives an authenticated session and can immediately use the application with default permissions, including the ability to submit media requests to Radarr/Sonarr. Any Seerr deployment where all three of the following are true may be vulnerable: `settings.main.mediaServerType` is set to `PLEX` (the most common deployment).; `settings.jellyfin.ip` is set to `""` (default, meaning Jellyfin was never configured); and `settings.main.newPlexLogin` is set to `true` (default). Jellyfin-configured and Emby-configured deployments are not affected. Version 3.1.0 of Seerr fixes this issue.

Affected products

seerr
  • ==>= 2.0.0, < 3.1.0
Ignored packages (7)
Not present in nixpkgs
Permalink CVE-2025-12150
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • terraform-providers.keycloak
    • python312Packages.python-keycloak
    • python313Packages.python-keycloak
    • terraform-providers.keycloak_keycloak
    • python314Packages.python-keycloak
  • @LeSuisse dismissed
Org.keycloak/keycloak-services: webauthn attestation statement verification bypass

A flaw was found in Keycloak’s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: "none", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration.

References

Affected products

keycloak
  • <26.4.4
rhbk/keycloak-rhel9
  • *
rhbk/keycloak-rhel9-operator
  • *
rhbk/keycloak-operator-bundle
  • *
org.keycloak/keycloak-services
Red Hat build of Keycloak 26.2.11

Matching in nixpkgs

Ignored packages (5)

Package maintainers

Not impacted
Permalink CVE-2026-28414
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    8 packages
    • pkgsRocm.python3Packages.gradio-client
    • pkgsRocm.python3Packages.gradio-pdf
    • python314Packages.gradio-client
    • python313Packages.gradio-client
    • python312Packages.gradio-client
    • python314Packages.gradio-pdf
    • python312Packages.gradio-pdf
    • python313Packages.gradio-pdf
  • @LeSuisse dismissed
Gradio has Absolute Path Traversal on Windows with Python 3.13+

Gradio is an open-source Python package designed for quick prototyping. Prior to version 6.7, Gradio apps running on Window with Python 3.13+ are vulnerable to an absolute path traversal issue that enables unauthenticated attackers to read arbitrary files from the file system. Python 3.13+ changed the definition of `os.path.isabs` so that root-relative paths like `/windows/win.ini` on Windows are no longer considered absolute paths, resulting in a vulnerability in Gradio's logic for joining paths safely. This can be exploited by unauthenticated attackers to read arbitrary files from the Gradio server, even when Gradio is set up with authentication. Version 6.7 fixes the issue.

Affected products

gradio
  • ==< 6.7

Matching in nixpkgs

Ignored packages (8)

Package maintainers

Windows only
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • malcontent
    • malcontent-ui
  • @LeSuisse dismissed
malcontent's nested archive extraction failure can drop content from scan inputs

malcontent is software for discovering supply-chain compromises through context, differential analysis, and YARA. Prior to version 1.21.0, malcontent would remove nested archives which failed to extract which could potentially leave malicious content. A better approach is to preserve these archives so that malcontent can attempt a best-effort scan of the archive bytes. Version 1.21.0 fixes the issue.

Affected products

malcontent
  • ==< 1.21.0
Ignored packages (2)
Not present in nixpkgs
Permalink CVE-2026-27793
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    7 packages
    • overseerr
    • jellyseerr
    • python312Packages.python-overseerr
    • python313Packages.python-overseerr
    • python314Packages.python-overseerr
    • home-assistant-component-tests.overseerr
    • tests.home-assistant-component-tests.overseerr
  • @LeSuisse dismissed
Seerr has Broken Object-Level Authorization in User Profile Endpoint that Exposes Third-Party Notification Credentials

Seerr is an open-source media request and discovery manager for Jellyfin, Plex, and Emby. Prior to version 3.1.0, the `GET /api/v1/user/:id` endpoint returns the full settings object for any user, including Pushover, Pushbullet, and Telegram credentials, to any authenticated requester regardless of their privilege level. This vulnerability can be exploited alone or combined with the reported unauthenticated account creation vulnerability, CVE-2026-27707. When combined, the two vulnerabilities create a zero-prior-access chain that leaks third-party API credentials for all users, including administrators. Version 3.1.0 contains a fix for both this vulnerability and for CVE-2026-27707.

Affected products

seerr
  • ==< 3.1.0
Ignored packages (7)
Not present in nixpkgs