Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • smfh
    • asmfmt
    • libsmf
    • nasmfmt
    • mt32emu-smf2wav
    • python312Packages.pysmf
    • python313Packages.pysmf
    • python314Packages.pysmf
    • tests.fetchFromGitHub.rootDir
  • @LeSuisse dismissed
free5GC SMF crash (nil pointer dereference) on PFCP SessionReportRequest when ReportType.USAR=1 and UsageReport omits mandatory URRID sub-IE 

free5GC SMF provides Session Management Function for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, SMF panics and terminates when processing a malformed PFCP SessionReportRequest on the PFCP (UDP/8805) interface. No known upstream fix is available, but some workarounds are available. ACL/firewall the PFCP interface so only trusted UPF IPs can reach SMF (reduce spoofing/abuse surface); drop/inspect malformed PFCP SessionReportRequest messages at the network edge where feasible, and/or add recover() around PFCP handler dispatch to avoid whole-process termination (mitigation only).

Affected products

smf
  • ==<= 1.4.1
Ignored packages (9)

pkgs.libsmf

C library for reading and writing Standard MIDI Files

Not present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
An issue was discovered in in bwm-ng v0.6.2. An arbitrary …

An issue was discovered in in bwm-ng v0.6.2. An arbitrary null write exists in get_cmdln_options() function in src/options.c.

Affected products

bwm-ng
  • ==bwm-ng v0.6.2

Matching in nixpkgs

Current stable branch was never impacted.
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • pscircle
    • libcircle
    • circle-flags
    • circleci-cli
    • pkgsRocm.libcircle
    • tela-circle-icon-theme
    • numix-icon-theme-circle
    • typstPackages.cross-circle
    • haskellPackages.circle-packing
    • typstPackages.cross-circle_1_0_0
  • @LeSuisse dismissed
Incorrect calculation in CIRCL secp384r1 CombinedMult

The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected. The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .

Affected products

CIRCL
  • <1.6.3
Ignored packages (10)

pkgs.libcircle

API for distributing embarrassingly parallel workloads using self-stabilization

Not directly present in nixpkgs
Permalink CVE-2026-28195
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
  • @LeSuisse dismissed
In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers …

In JetBrains TeamCity before 2025.11.3 missing authorization allowed project developers to add parameters to build configurations

Affected products

TeamCity
  • <2025.11.3
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-28196
2.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
  • @LeSuisse dismissed
In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a …

In JetBrains TeamCity before 2025.11.3 disabling versioned settings left a credentials config on disk

Affected products

TeamCity
  • <2025.11.3
Ignored packages (3)
Not present in nixpkgs
Permalink CVE-2026-28194
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
  • @LeSuisse dismissed
In JetBrains TeamCity before 2025.11.3 open redirect was possible in …

In JetBrains TeamCity before 2025.11.3 open redirect was possible in the React project creation flow

Affected products

TeamCity
  • <2025.11.3
Ignored packages (3)
Not present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • typstPackages.mercator
    • typstPackages.mercator_0_1_0
    • typstPackages.mercator_0_1_1
  • @LeSuisse dismissed
Mercator vulnerable to stored XSS via unescaped Blade directives in display templates

Mercator is an open source web application designed to enable mapping of information systems. A stored Cross-Site Scripting (XSS) vulnerability exists in Mercator prior to version 2026.02.22 due to the use of unescaped Blade directives (`{!! !!}`) in display templates. An authenticated user with the User role can inject arbitrary JavaScript payloads into fields such as "contact point" when creating or editing entities. The payload is then executed in the browser of any user who views the affected page, including administrators. Version 2026.02.22 fixes the vulnerability.

Affected products

mercator
  • ==< 2026.02.22
Ignored packages (3)
Not present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • loudmouth
    • cloudmonkey
    • python312Packages.nextcloudmonitor
    • python313Packages.nextcloudmonitor
    • python314Packages.nextcloudmonitor
  • @LeSuisse dismissed
free5GC has Null Pointer Dereference in UDM, Leading to Service Panic

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. Versions up to and including 1.4.1 have a NULL Pointer Dereference vulnerability. Remote unauthenticated attackers can trigger a service panic (Denial of Service) by sending a crafted PUT request with an unexpected ueId, crashing the UDM service. All deployments of free5GC using the UDM component may be affected. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Affected products

udm
  • ==<= 1.4.1
Ignored packages (5)
Not present in nixpkgs
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    10 packages
    • svelte-check
    • svelte-language-server
    • nodePackages.svelte-check
    • nodePackages_latest.svelte-check
    • vscode-extensions.svelte.svelte-vscode
    • tree-sitter-grammars.tree-sitter-svelte
    • vimPlugins.nvim-treesitter-parsers.svelte
    • python312Packages.tree-sitter-grammars.tree-sitter-svelte
    • python313Packages.tree-sitter-grammars.tree-sitter-svelte
    • python314Packages.tree-sitter-grammars.tree-sitter-svelte
  • @LeSuisse dismissed
Svelte vulnerable to XSS during SSR with contenteditable `bind:innerText` and `bind:textContent`

Svelte performance oriented web framework. Prior to version 5.53.5, the contents of `bind:innerText` and `bind:textContent` on `contenteditable` elements were not properly escaped. This could enable HTML injection and Cross-Site Scripting (XSS) if rendering untrusted data as the binding's initial value on the server. Version 5.53.5 fixes the issue.

Affected products

svelte
  • ==< 5.53.5
Ignored packages (10)
Not present in nixpkgs
Permalink CVE-2026-25741
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • matrix-zulip-bridge
    • zulip
    • zulip-term
    • python312Packages.zulip
    • python313Packages.zulip
    • python314Packages.zulip
    • python312Packages.zulip-emoji-mapping
    • python313Packages.zulip-emoji-mapping
    • python314Packages.zulip-emoji-mapping
  • @LeSuisse dismissed
Zulip Vulnerable to Modification of Payment Method (Stripe Default Card) by Non-Billing Users

Zulip is an open-source team collaboration tool. Prior to commit bf28c82dc9b1f630fa8e9106358771b20a0040f7, the API endpoint for creating a card update session during an upgrade flow was accessible to users with only organization member privileges. When the associated Stripe Checkout session is completed, the Stripe webhook updates the organization’s default payment method. Because no billing-specific authorization check is enforced, a regular (non-billing) member can change the organization’s payment method. This vulnerability affected the Zulip Cloud payment processing system, and has been patched as of commit bf28c82dc9b1f630fa8e9106358771b20a0040f7. Self-hosted deploys are no longer affected and no patch or upgrade is required for them.

Affected products

zulip
  • ==< bf28c82dc9b1f630fa8e9106358771b20a0040f7
Ignored packages (9)
Zulip server not present in nixpkgs