Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-27700
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    22 packages
    • libsForQt5.phonon
    • kdePackages.phonon
    • kdePackages.phonon-vlc
    • plasma5Packages.phonon
    • typstPackages.phonokit
    • python312Packages.phonopy
    • python313Packages.phonopy
    • python314Packages.phonopy
    • typstPackages.phonokit_0_0_1
    • typstPackages.phonokit_0_2_0
    • typstPackages.phonokit_0_3_0
    • typstPackages.phonokit_0_3_5
    • typstPackages.phonokit_0_3_6
    • typstPackages.phonokit_0_3_7
    • typstPackages.phonokit_0_4_0
    • libsForQt5.phonon-backend-vlc
    • python312Packages.pythonocc-core
    • python313Packages.pythonocc-core
    • python314Packages.pythonocc-core
    • plasma5Packages.phonon-backend-vlc
    • libsForQt5.phonon-backend-gstreamer
    • plasma5Packages.phonon-backend-gstreamer
  • @LeSuisse dismissed
Hono is Vulnerable to Authentication Bypass by IP Spoofing in AWS Lambda ALB conninfo

Hono is a Web application framework that provides support for any JavaScript runtime. In versions 4.12.0 and 4.12.1, when using the AWS Lambda adapter (`hono/aws-lambda`) behind an Application Load Balancer (ALB), the `getConnInfo()` function incorrectly selected the first value from the `X-Forwarded-For` header. Because AWS ALB appends the real client IP address to the end of the `X-Forwarded-For` header, the first value can be attacker-controlled. This could allow IP-based access control mechanisms (such as the `ipRestriction` middleware) to be bypassed. Version 4.12.2 patches the issue.

Affected products

hono
  • ==>= 4.12.0, < 4.12.2
Ignored packages (22)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    20 packages
    • serverspec
    • vscode-langservers-extracted
    • haskellPackages.serversession
    • python312Packages.pytest-mockservers
    • python313Packages.pytest-mockservers
    • python314Packages.pytest-mockservers
    • haskellPackages.serversession-frontend-wai
    • haskellPackages.serversession-backend-redis
    • haskellPackages.serversession-frontend-snap
    • python312Packages.paypal-checkout-serversdk
    • python313Packages.paypal-checkout-serversdk
    • python314Packages.paypal-checkout-serversdk
    • haskellPackages.serversession-frontend-yesod
    • haskellPackages.serversession-backend-acid-state
    • python312Packages.azure-mgmt-mysqlflexibleservers
    • python313Packages.azure-mgmt-mysqlflexibleservers
    • python314Packages.azure-mgmt-mysqlflexibleservers
    • python312Packages.azure-mgmt-postgresqlflexibleservers
    • python313Packages.azure-mgmt-postgresqlflexibleservers
    • python314Packages.azure-mgmt-postgresqlflexibleservers
  • @LeSuisse dismissed
mcp-server-git : Path traversal in git_add allows staging files outside repository boundaries

Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). In mcp-server-git versions prior to 2026.1.14, the git_add tool did not validate that file paths provided in the files argument were within the repository boundaries. Because the tool used GitPython's repo.index.add() rather than the Git CLI, relative paths containing `../` sequences that resolve outside the repository were accepted and staged into the Git index. Users are advised to upgrade to 2026.1.14 or newer to remediate this issue.

Affected products

servers
  • ==< 2026.1.14
Ignored packages (20)
Not present in nixpkgs
Permalink CVE-2025-67860
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package theharvester
  • @LeSuisse dismissed
NeuVector scanner insecurely handles passwords as command arguments

A vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credentials to local users.

Affected products

github.com/neuvector/scanner
  • <4.072
Ignored packages (1)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • smfh
    • asmfmt
    • libsmf
    • nasmfmt
    • mt32emu-smf2wav
    • python312Packages.pysmf
    • python313Packages.pysmf
    • python314Packages.pysmf
    • tests.fetchFromGitHub.rootDir
  • @LeSuisse dismissed
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE 

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Affected products

smf
  • ==<= 1.4.1
Ignored packages (9)

pkgs.libsmf

C library for reading and writing Standard MIDI Files

Not present in nixpkgs
Permalink CVE-2026-3053
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • rubyPackages.jekyll-theme-dinky
    • rubyPackages_3_1.jekyll-theme-dinky
    • rubyPackages_3_2.jekyll-theme-dinky
    • rubyPackages_3_3.jekyll-theme-dinky
    • rubyPackages_3_4.jekyll-theme-dinky
    • rubyPackages_4_0.jekyll-theme-dinky
  • @LeSuisse dismissed
DataLinkDC dinky OpenAPI Endpoint AppConfig.java addInterceptors missing authentication

A vulnerability was determined in DataLinkDC dinky up to 1.2.5. This affects the function addInterceptors of the file dinky-admin/src/main/java/org/dinky/configure/AppConfig.java of the component OpenAPI Endpoint. Executing a manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

dinky
  • ==1.2.5
  • ==1.2.2
  • ==1.2.1
  • ==1.2.3
  • ==1.2.0
  • ==1.2.4
Ignored packages (6)
Not present in nixpkgs
Permalink CVE-2026-27567
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • payload_dumper
    • payload-dumper-go
    • payloadsallthethings
    • android-ota-payload-extractor
  • @LeSuisse dismissed
Payload has Server-Side Request Forgery (SSRF) in External File URL Uploads

Payload is a free and open source headless content management system. Prior to 3.75.0, a Server-Side Request Forgery (SSRF) vulnerability exists in Payload's external file upload functionality. When processing external URLs for file uploads, insufficient validation of HTTP redirects could allow an authenticated attacker to access internal network resources. The Payload environment must have at least one collection with `upload` enabled and a user who has `create` access to that upload-enabled collection in order to be vulnerable. An authenticated user with upload collection write permissions could potentially access internal services. Response content from internal services could be retrieved through the application. This vulnerability has been patched in v3.75.0. As a workaround, one may mitigate this vulnerability by disabling external file uploads via the `disableExternalFile` upload collection option, or by restricting `create` access on upload-enabled collections to trusted users only.

Affected products

payload
  • ==< 3.75.0
Ignored packages (4)
Not present in nixpkgs
Permalink CVE-2025-33180
8.0 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package convos
  • @LeSuisse dismissed
NVIDIA Cumulus Linux and NVOS products contain a vulnerability in …

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Affected products

NVOS
  • ==All versions prior to 1.3 - 25.02.244
  • ==All versions prior to 25.02.4282
  • ==All versions prior to 25.02.5030
Cumulus Linux GA
  • ==All versions prior to 5.14 (5.13.x, 5.12.x, and older GA versions)
Cumulus Linux LTS
  • ==All versions prior to 5.11.4
  • ==All versions prior to 5.9.4
Ignored packages (1)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • loudmouth
    • cloudmonkey
    • python312Packages.nextcloudmonitor
    • python313Packages.nextcloudmonitor
    • python314Packages.nextcloudmonitor
  • @LeSuisse dismissed
free5GC has Improper Input Validation in UDM UEAU Service

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, remote attackers can inject control characters (e.g., %00) into the supi parameter, triggering internal URL parsing errors (net/url: invalid control character). This exposes system-level error details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UEAU service may be affected. free5gc/udm pull request 75 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Affected products

udm
  • ==<= 1.4.1
Ignored packages (5)
Not present in nixpkgs
Permalink CVE-2025-33181
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package convos
  • @LeSuisse dismissed
NVIDIA Cumulus Linux and NVOS products contain a vulnerability in …

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Affected products

NVOS
  • ==All versions prior to 1.3 - 25.02.244
  • ==All versions prior to 25.02.4282
  • ==All versions prior to 25.02.5030
Cumulus Linux GA
  • ==All versions prior to 5.14 (5.13.x, 5.12.x, and older GA versions)
Cumulus Linux LTS
  • ==All versions prior to 5.11.4
  • ==All versions prior to 5.9.4
Ignored packages (1)
Not present in nixpkgs
updated 3 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • eludris
    • cloudrecon
    • vscode-extensions.saoudrizwan.claude-dev
  • @LeSuisse dismissed
free5GC has improper error handling in NEF with information exposure

free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the NEF component reliably leaks internal parsing error details (e.g., invalid character 'n' after top-level value) to remote clients, which can aid attackers in service fingerprinting. All deployments of free5GC using the Nnef_PfdManagement service may be affected. free5gc/udr pull request 56 contains a patch for the issue. There is no direct workaround at the application level. The recommendation is to apply the provided patch.

Affected products

udr
  • ==<= 1.4.1
Ignored packages (3)
Not present in nixpkgs