Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-9909
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Aap-gateway: improper path validation in gateway allows credential exfiltration

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
automation-gateway
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/gateway-rhel8
  • *
ansible-automation-platform-26/gateway-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs
Permalink CVE-2025-9908
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Event-driven-ansible: sensitive internal headers disclosure in aap eda event streams

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
automation-eda-controller
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/eda-controller-rhel8
  • *
ansible-automation-platform-26/eda-controller-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs
Permalink CVE-2025-9907
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 1 day ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
Event-driven-ansible: event stream test mode exposes sensitive headers in aap eda

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Stream API. This vulnerability allows exposure of sensitive client credentials and internal infrastructure headers via the test_headers field when an event stream is in test mode. The possible outcome includes leakage of internal infrastructure details, accidental disclosure of user or system credentials, privilege escalation if high-value tokens are exposed, and persistent sensitive data exposure to all users with read access on the event stream.

References

Affected products

bindep
  • *
molecule
  • *
ansible-lint
  • *
ansible-sign
  • *
automation-hub
  • *
ansible-builder
  • *
ansible-creator
  • *
ansible-dev-tools
  • *
ansible-navigator
  • *
python3.11-django
  • *
python3.11-pluggy
  • *
python3.11-pytest
  • *
python3.11-distlib
  • *
python3.11-execnet
  • *
python3.11-gunicorn
  • *
python3.11-galaxy-ng
  • *
python3.11-tox-ansible
  • *
ansible-dev-environment
  • *
python3.11-pytest-xdist
  • *
automation-eda-controller
  • *
python3.11-ansible-compat
  • *
python3.11-pytest-ansible
  • *
python3.11-subprocess-tee
  • *
python3.11-galaxy-importer
  • *
python3.11-ruamel-yaml-clib
  • *
python3.11-typing-extensions
  • *
ansible-automation-platform-25/eda-controller-rhel8
  • *
ansible-automation-platform-26/eda-controller-rhel9
  • *

Matching in nixpkgs

Package maintainers

Red Hat Ansible Automation Platform not in nixpkgs
updated 3 weeks, 2 days ago by @anthonyroussel Activity log
  • Created automatic suggestion
  • @anthonyroussel dismissed
It was found that the Apache ActiveMQ client before 5.14.5 …

It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.

Affected products

ActiveMQ
  • ==5.15.5

Matching in nixpkgs

Package maintainers

Old CVE, fixed with ActiveMQ 5.14.5
Upstream commit: https://github.com/apache/activemq/commit/b8fc78e
https://issues.apache.org/jira/browse/AMQ-6470
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • tests.pkg-config.defaultPkgConfigPackages.ImageMagick
    • tests.pkg-config.defaultPkgConfigPackages.MagickWand
    • graphicsmagick-imagemagick-compat
  • @LeSuisse dismissed
A heap-based buffer overflow vulnerability was found in ImageMagick in …

A heap-based buffer overflow vulnerability was found in ImageMagick in versions prior to 7.0.11-14 in ReadTIFFImage() in coders/tiff.c. This issue is due to an incorrect setting of the pixel array size, which can lead to a crash and segmentation fault.

Affected products

ImageMagick
  • ==ImageMagick 7.0.11-14

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Current stable branch was never impacted
Permalink CVE-2024-37931
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    76 packages
    • pinpoint
    • git-point
    • ratpoints
    • mountpoint-s3
    • breakpointHook
    • libpointmatcher
    • xpointerbarrier
    • highlight-pointer
    • breakpointHookCntr
    • quake3pointrelease
    • haskellPackages.pointed
    • haskellPackages.fixpoint
    • haskellPackages.pointfree
    • python312Packages.pypoint
    • python313Packages.pypoint
    • haskellPackages.breakpoint
    • haskellPackages.mountpoints
    • haskellPackages.pointedlist
    • python312Packages.datapoint
    • python313Packages.datapoint
    • haskellPackages.pointless-fun
    • python312Packages.entrypoint2
    • python312Packages.entrypoints
    • python312Packages.jsonpointer
    • python313Packages.entrypoint2
    • python313Packages.entrypoints
    • python313Packages.jsonpointer
    • gnomeExtensions.pointer-tracker
    • rubyPackages.indieweb-endpoints
    • haskellPackages.amazonka-pinpoint
    • python312Packages.fastentrypoints
    • python313Packages.fastentrypoints
    • typstPackages.stack-pointer_0_1_0
    • python312Packages.entry-points-txt
    • python312Packages.orbax-checkpoint
    • python313Packages.entry-points-txt
    • python313Packages.orbax-checkpoint
    • typstPackages.pointless-size_0_1_0
    • typstPackages.pointless-size_0_1_1
    • rubyPackages_3_1.indieweb-endpoints
    • rubyPackages_3_2.indieweb-endpoints
    • rubyPackages_3_3.indieweb-endpoints
    • rubyPackages_3_4.indieweb-endpoints
    • home-assistant-component-tests.point
    • haskellPackages.acme-pointful-numbers
    • python312Packages.mypy-boto3-pinpoint
    • python313Packages.mypy-boto3-pinpoint
    • python312Packages.checkpoint-schedules
    • python312Packages.langgraph-checkpoint
    • python313Packages.checkpoint-schedules
    • python313Packages.langgraph-checkpoint
    • haskellPackages.amazonka-pinpoint-email
    • haskellPackages.amazonka-pinpoint-sms-voice
    • python312Packages.mypy-boto3-pinpoint-email
    • python313Packages.mypy-boto3-pinpoint-email
    • python312Packages.types-aiobotocore-pinpoint
    • python313Packages.types-aiobotocore-pinpoint
    • python312Packages.langgraph-checkpoint-sqlite
    • python313Packages.langgraph-checkpoint-sqlite
    • haskellPackages.amazonka-pinpoint-sms-voice-v2
    • python312Packages.langgraph-checkpoint-postgres
    • python312Packages.mypy-boto3-pinpoint-sms-voice
    • python313Packages.langgraph-checkpoint-postgres
    • python313Packages.mypy-boto3-pinpoint-sms-voice
    • python312Packages.mypy-boto3-pinpoint-sms-voice-v2
    • python312Packages.types-aiobotocore-pinpoint-email
    • python313Packages.mypy-boto3-pinpoint-sms-voice-v2
    • python313Packages.types-aiobotocore-pinpoint-email
    • python312Packages.backports-entry-points-selectable
    • python313Packages.backports-entry-points-selectable
    • python312Packages.types-aiobotocore-pinpoint-sms-voice
    • python313Packages.types-aiobotocore-pinpoint-sms-voice
    • python312Packages.azure-synapse-managedprivateendpoints
    • python313Packages.azure-synapse-managedprivateendpoints
    • python312Packages.types-aiobotocore-pinpoint-sms-voice-v2
    • python313Packages.types-aiobotocore-pinpoint-sms-voice-v2
  • @LeSuisse dismissed
WordPress Point theme <= 1.1 - Cross Site Request Forgery (CSRF) vulnerability

Cross-Site Request Forgery (CSRF) vulnerability in Creativthemes Point allows Cross Site Request Forgery.This issue affects Point: from n/a through 1.1.

Affected products

point
  • =<1.1
Ignored packages (76)

pkgs.pinpoint

Tool for making hackers do excellent presentations

  • nixos-unstable -

pkgs.git-point

Set arbitrary refs without shooting yourself in the foot, a procelain `git update-ref`

  • nixos-unstable -

pkgs.ratpoints

Program to find rational points on hyperelliptic curves

pkgs.mountpoint-s3

Simple, high-throughput file client for mounting an Amazon S3 bucket as a local file system

pkgs.libpointmatcher

"Iterative Closest Point" library for 2-D/3-D mapping in robotic

  • nixos-unstable -

pkgs.xpointerbarrier

Create X11 pointer barriers around your working area

  • nixos-unstable -
WP theme not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • eludris
    • cloudrecon
    • vscode-extensions.saoudrizwan.claude-dev
  • @LeSuisse dismissed
free5GC vulnerable to improper error handling in NEF with information exposure

free5GC is an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 of the User Data Repository are affected by Improper Error Handling with Information Exposure. The NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be vulnerable. free5gc/udr pull request 56 contains a patch. No direct workaround is available at the application level. Applying the official patch is recommended.

Affected products

udr
  • ==<= 1.4.1
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-25899
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • guile-fibers
    • ocamlPackages.fiber
    • ocamlPackages_latest.fiber
  • @LeSuisse dismissed
Fiber is Vulnerable to Denial of Service via Flash Cookie Unbounded Allocation

Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of whether the application uses flash messages. Version 3.1.0 fixes the issue.

Affected products

fiber
  • ==>= 3.0.0, < 3.1.0
Ignored packages (3)
Not directly present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • guile-fibers
    • ocamlPackages.fiber
    • ocamlPackages_latest.fiber
  • @LeSuisse dismissed
Fiber has a Denial of Service Vulnerability via Route Parameter Overflow

Fiber is an Express inspired web framework written in Go. A denial of service vulnerability exists in Fiber v2 and v3 that allows remote attackers to crash the application by sending requests to routes with more than 30 parameters. The vulnerability results from missing validation during route registration combined with an unbounded array write during request matching. Version 2.52.12 patches the issue in the v2 branch and 3.1.0 patches the issue in the v3 branch.

Affected products

fiber
  • ==>= 2.0.0, < 2.52.12
  • ==>= 3.0.0, < 3.1.0
Ignored packages (3)
Not directly present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • guile-fibers
    • ocamlPackages.fiber
    • ocamlPackages_latest.fiber
  • @LeSuisse dismissed
Fiber has an Arbitrary File Read in Static Middleware on Windows

Fiber is an Express inspired web framework written in Go. A Path Traversal (CWE-22) vulnerability in Fiber allows a remote attacker to bypass the static middleware sanitizer and read arbitrary files on the server file system on Windows. This affects Fiber v3 through version 3.0.0. This has been patched in Fiber v3 version 3.1.0.

Affected products

fiber
  • ==>= 3.0.0, < 3.1.0
Ignored packages (3)
Not directly present in nixpkgs, Windows