Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 1 month ago by @emilylange Activity log
  • Created automatic suggestion
  • @emilylange dismissed
Insufficient policy enforcement in extensions in Google Chrome prior to …

Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.

References

Affected products

Chrome
  • <79.0.3945.79

Matching in nixpkgs

pkgs.netflix

Open Netflix in Google Chrome app mode

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Old CVE, long fixed
updated 1 month ago by @emilylange Activity log
  • Created automatic suggestion
  • @emilylange dismissed
Uninitialized data in rendering in Google Chrome on Android prior …

Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

References

Affected products

Chrome
  • <79.0.3945.79

Matching in nixpkgs

pkgs.netflix

Open Netflix in Google Chrome app mode

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Old CVE, long fixed, Android-only
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package aardvark-dns
  • @LeSuisse dismissed
WordPress Aardvark theme <= 4.6.3 - Reflected Cross Site Scripting (XSS) vulnerability

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhostPool Aardvark aardvark allows Reflected XSS.This issue affects Aardvark: from n/a through <= 4.6.3.

Affected products

aardvark
  • =<<= 4.6.3
Ignored packages (1)
WP theme not present in nixpkgs
Permalink CVE-2026-27197
9.1 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Sentry: Improper Authentication on SAML SSO process allows user identity linking

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. Self-hosted users are only at risk if the following criteria is met: ore than one organizations are configured (SENTRY_SINGLE_ORGANIZATION = True), or malicious user has existing access and permissions to modify SSO settings for another organization in a multo-organization instance. This issue has been fixed in version 26.2.0. To workaround this issue, implement user account-based two-factor authentication to prevent an attacker from being able to complete authentication with a victim's user account. Organization administrators cannot do this on a user's behalf, this requires individual users to ensure 2FA has been enabled for their account.

Affected products

sentry
  • ==>= 21.12.0, < 26.2.0

Matching in nixpkgs

Package maintainers

Not in nixpkgs
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Use after free in media picker in Google Chrome prior …

Use after free in media picker in Google Chrome prior to 79.0.3945.88 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

References

Affected products

Chrome
  • <79.0.3945.88

Matching in nixpkgs

pkgs.netflix

Open Netflix in Google Chrome app mode

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixos-25.11-small
    • nixpkgs-25.11-darwin
Old CVE, long fixed
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.schedula
    • python313Packages.schedula
    • python314Packages.schedula
  • @LeSuisse dismissed
WordPress Schedula plugin <= 1.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in vertim Schedula schedula-smart-appointment-booking allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schedula: from n/a through <= 1.0.

Affected products

schedula-smart-appointment-booking
  • =<<= 1.0
Ignored packages (3)
WP plugin not present in nixpkgs
Permalink CVE-2026-2873
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • winbox4
    • jitsi-videobridge
    • rocmPackages.hiprt
    • tests.testers.runCommand.bork
  • @LeSuisse dismissed
Tenda A21 openSchedWifi setSchedWifi stack-based overflow

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.

Affected products

A21
  • ==1.0.0.0
Ignored packages (4)

pkgs.winbox4

Graphical configuration utility for RouterOS-based devices

Not present in nixpkgs
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt dismissed
Werkzeug safe_join() allows Windows special device names

Werkzeug is a comprehensive WSGI web application library. Versions 3.1.5 and below, the safe_join function allows Windows device names as filenames if preceded by other path segments. This was previously reported as GHSA-hgf8-39gv-g3f2, but the added filtering failed to account for the fact that safe_join accepts paths with multiple segments, such as example/NUL. The function send_from_directory uses safe_join to safely serve files at user-specified paths under a directory. If the application is running on Windows, and the requested path ends with a special device name, the file will be opened successfully, but reading will hang indefinitely. This issue has been fixed in version 3.1.6.

Affected products

werkzeug
  • ==< 3.1.6

Matching in nixpkgs

Only affects Windows
Permalink CVE-2026-2946
3.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    18 packages
    • everforest-cursors
    • everforest-gtk-theme
    • haskellPackages.dirforest
    • haskellPackages.data-forest
    • python312Packages.pyecoforest
    • python313Packages.pyecoforest
    • python314Packages.pyecoforest
    • haskellPackages.ForestStructures
    • python312Packages.quantile-forest
    • python313Packages.quantile-forest
    • python314Packages.quantile-forest
    • haskellPackages.genvalidity-dirforest
    • home-assistant-component-tests.ecoforest
    • tests.home-assistant-component-tests.ecoforest
    • home-assistant-component-tests.rainforest_eagle
    • home-assistant-component-tests.rainforest_raven
    • tests.home-assistant-component-tests.rainforest_eagle
    • tests.home-assistant-component-tests.rainforest_raven
  • @mweinelt dismissed
rymcu forest Article Content/Comments/Portfolio XssUtils.java XssUtils.replaceHtmlCode cross site scripting

A security vulnerability has been detected in rymcu forest up to 0.0.5. Affected by this issue is the function XssUtils.replaceHtmlCode of the file src/main/java/com/rymcu/forest/util/XssUtils.java of the component Article Content/Comments/Portfolio. The manipulation leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

forest
  • ==0.0.3
  • ==0.0.4
  • ==0.0.5
  • ==0.0.1
  • ==0.0.2
Ignored packages (18)
Not in nixpkgs
Permalink CVE-2026-2947
3.5 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @LeSuisse removed package tests.home-assistant-component-tests.ecoforest
  • @mweinelt removed
    17 packages
    • everforest-cursors
    • everforest-gtk-theme
    • haskellPackages.dirforest
    • haskellPackages.data-forest
    • python312Packages.pyecoforest
    • python313Packages.pyecoforest
    • python314Packages.pyecoforest
    • haskellPackages.ForestStructures
    • python312Packages.quantile-forest
    • python313Packages.quantile-forest
    • python314Packages.quantile-forest
    • haskellPackages.genvalidity-dirforest
    • home-assistant-component-tests.ecoforest
    • home-assistant-component-tests.rainforest_eagle
    • home-assistant-component-tests.rainforest_raven
    • tests.home-assistant-component-tests.rainforest_eagle
    • tests.home-assistant-component-tests.rainforest_raven
  • @mweinelt dismissed
rymcu forest User Profile UserInfoController.java updateUserInfo cross site scripting

A vulnerability was detected in rymcu forest up to 0.0.5. This affects the function updateUserInfo of the file - src/main/java/com/rymcu/forest/web/api/user/UserInfoController.java of the component User Profile Handler. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

forest
  • ==0.0.3
  • ==0.0.4
  • ==0.0.5
  • ==0.0.1
  • ==0.0.2
Ignored packages (18)
Not in nixpkgs