Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-2849
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Cache Sync CacheController.java syncCache access control

A vulnerability has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function deleteCache/removeAllCache/syncCache of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\CacheController.java of the component Cache Sync Handler. Such manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Ignored packages (1)
Not present in nixpkgs
Permalink CVE-2026-2852
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 4 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Sales Endpoint SalesController.java deleteSales access control

A vulnerability was identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This issue affects the function addSales/updateSales/deleteSales of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\SalesController.java of the component Sales Endpoint. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Ignored packages (1)
Not present in nixpkgs
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    26 packages
    • happy
    • happy-coder
    • triggerhappy
    • haskellPackages.happy
    • haskellPackages.happy-dot
    • haskellPackages.happy-lib
    • haskellPackages.happy-meta
    • ocamlPackages.happy-eyeballs
    • haskellPackages.happy-arbitrary
    • ocamlPackages.happy-eyeballs-lwt
    • gnomeExtensions.happy-appy-hotkey
    • ocamlPackages.mimic-happy-eyeballs
    • python312Packages.aiohappyeyeballs
    • python313Packages.aiohappyeyeballs
    • python314Packages.aiohappyeyeballs
    • ocamlPackages.happy-eyeballs-mirage
    • ocamlPackages_latest.happy-eyeballs
    • tests.testers.testBuildFailure.happy
    • tests.testers.testBuildFailure'.happy
    • ocamlPackages.happy-eyeballs-miou-unix
    • ocamlPackages_latest.happy-eyeballs-lwt
    • ocamlPackages_latest.mimic-happy-eyeballs
    • ocamlPackages_latest.happy-eyeballs-mirage
    • ocamlPackages_latest.happy-eyeballs-miou-unix
    • tests.testers.testBuildFailure.happyStructuredAttrs
    • tests.testers.testBuildFailure'.happyStructuredAttrs
  • @mweinelt dismissed
WordPress HAPPY plugin <= 1.0.8 - Broken Access Control vulnerability

Missing Authorization vulnerability in VillaTheme HAPPY happy-helpdesk-support-ticket-system allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects HAPPY: from n/a through <= 1.0.8.

Affected products

happy-helpdesk-support-ticket-system
  • =<<= 1.0.8
Ignored packages (26)

pkgs.happy-coder

Mobile and web client wrapper for Claude Code and Codex with end-to-end encryption

pkgs.tests.testers.testBuildFailure%27.happy

A wrapper around testers.testBuildFailure to simplify common use cases

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Not in nixpkgs
Permalink CVE-2026-2967
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package mongoose
  • @mweinelt dismissed
Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.7
  • ==7.8
  • ==7.15
  • ==7.4
  • ==7.11
  • ==7.9
  • ==7.3
  • ==7.17
  • ==7.10
  • ==7.5
  • ==7.19
  • ==7.6
  • ==7.12
  • ==7.18
  • ==7.1
  • ==7.0
  • ==7.13
  • ==7.2
  • ==7.14
  • ==7.16
  • ==7.20
Ignored packages (1)
Not in nixpkgs
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    9 packages
    • python312Packages.pysmf
    • python313Packages.pysmf
    • python314Packages.pysmf
    • tests.fetchFromGitHub.rootDir
    • mt32emu-smf2wav
    • nasmfmt
    • libsmf
    • asmfmt
    • smfh
  • @mweinelt dismissed
free5GC hasProtocol Compliance Violation in UPF Leading to SMF Service Disruption

free5GC is an open-source project for 5th generation (5G) mobile core networks. free5GC go-upf versions up to and including 1.2.6, corresponding to free5gc smf up to and including 1.4.0, have an Improper Input Validation and Protocol Compliance vulnerability leading to Denial of Service. Remote attackers can disrupt core network functionality by sending a malformed PFCP Association Setup Request. The UPF incorrectly accepts it, entering an inconsistent state that causes subsequent legitimate requests to trigger SMF reconnection loops and service degradation. All deployments of free5GC using the UPF and SMF components may be affected. As of time of publication, a fix is in development but not yet available. No direct workaround is available at the application level. Applying the official patch, once released, is recommended.

Affected products

smf
  • ==<= 1.4.0
go-upf
  • ==<= 1.2.6
Ignored packages (9)

pkgs.libsmf

C library for reading and writing Standard MIDI Files

Not in nixpkgs
Permalink CVE-2026-2968
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package mongoose
  • @mweinelt dismissed
Cesanta Mongoose Poly1305 Authentication Tag tls_chacha20.c mg_chacha20_poly1305_decrypt signature verification

A vulnerability was detected in Cesanta Mongoose up to 7.20. This impacts the function mg_chacha20_poly1305_decrypt of the file /src/tls_chacha20.c of the component Poly1305 Authentication Tag Handler. The manipulation results in improper verification of cryptographic signature. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.7
  • ==7.8
  • ==7.15
  • ==7.4
  • ==7.11
  • ==7.9
  • ==7.3
  • ==7.17
  • ==7.10
  • ==7.5
  • ==7.19
  • ==7.6
  • ==7.12
  • ==7.18
  • ==7.1
  • ==7.0
  • ==7.13
  • ==7.2
  • ==7.14
  • ==7.16
  • ==7.20
Ignored packages (1)
Not in nixpkgs
Permalink CVE-2026-2966
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package mongoose
  • @mweinelt dismissed
Cesanta Mongoose DNS Transaction ID dns.c mg_sendnsreq random values

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.7
  • ==7.8
  • ==7.15
  • ==7.4
  • ==7.11
  • ==7.9
  • ==7.3
  • ==7.17
  • ==7.10
  • ==7.5
  • ==7.19
  • ==7.6
  • ==7.12
  • ==7.18
  • ==7.1
  • ==7.0
  • ==7.13
  • ==7.2
  • ==7.14
  • ==7.16
  • ==7.20
Ignored packages (1)
Not in nixpkgs
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    5 packages
    • loudmouth
    • cloudmonkey
    • python312Packages.nextcloudmonitor
    • python313Packages.nextcloudmonitor
    • python314Packages.nextcloudmonitor
  • @mweinelt dismissed
free5GC has Improper Error Handling in UDM, Leading to Information Exposure

free5gc UDM provides Unified Data Management (UDM) for free5GC, an open-source project for 5th generation (5G) mobile core networks. In versions up to and including 1.4.1, the service reliably leaks detailed internal error messages (e.g., strconv.ParseInt parsing errors) to remote clients when processing invalid pduSessionId inputs. This exposes implementation details and can be used for service fingerprinting. All deployments of free5GC using the UDM Nudm_UECM DELETE service may be vulnerable. free5gc/udm pull request 76 contains a fix for the issue. No direct workaround is available at the application level. Applying the official patch is recommended.

Affected products

udm
  • ==<= 1.4.1
Ignored packages (5)
Not in nixpkgs
Permalink CVE-2026-26365
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    23 packages
    • ghost
    • ghostie
    • ghostty
    • ghost-cli
    • ghostfolio
    • ghostunnel
    • ghostscript
    • ghosttohugo
    • ghostty-bin
    • ghostscriptX
    • ghostscript_headless
    • libsForQt5.ghostwriter
    • kdePackages.ghostwriter
    • plasma5Packages.ghostwriter
    • haskellPackages.ghost-buster
    • python312Packages.ghostscript
    • python313Packages.ghostscript
    • python314Packages.ghostscript
    • tests.texlive.dvipng.ghostscript
    • haskellPackages.ghostscript-parallel
    • tree-sitter-grammars.tree-sitter-ghostty
    • python313Packages.tree-sitter-grammars.tree-sitter-ghostty
    • python314Packages.tree-sitter-grammars.tree-sitter-ghostty
  • @mweinelt dismissed
Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles …

Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles processing of custom hop-by-hop HTTP headers, where an incoming request containing the header "Connection: Transfer-Encoding" could result in a forward request with invalid message framing, depending on the Akamai processing path. This could result in the origin server parsing the request body incorrectly, leading to HTTP request smuggling.

Affected products

Ghost
  • <2026-02-06
Ignored packages (23)
Cloud service, not in nixpkgs.
updated 3 weeks, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    3 packages
    • eludris
    • cloudrecon
    • vscode-extensions.saoudrizwan.claude-dev
  • @mweinelt dismissed
free5GC UDR's NEF incorrectly returns 500 for missing PFD data (UDR 404) in Nnef_PfdManagement GET request

free5GC UDR is the user data repository (UDR) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. Versions prior to 1.4.1 contain an Improper Error Handling vulnerability with Information Exposure. All deployments of free5GC using the Nnef_PfdManagement service may be affected. The NEF component reliably leaks internal parsing errors (e.g., invalid character 'n' after top-level value) to remote clients. This can aid attackers in fingerprinting server software and logic flows. Version 1.4.1 fixes the issue. There is no direct workaround at the application level. The recommended mitigation is to apply the provided patch.

Affected products

udr
  • ==< 1.4.1
Ignored packages (3)
Not in nixpkgs