Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2025-47359
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @jopejoe1 dismissed
Use After Free in Secure Processor

Memory Corruption when multiple threads simultaneously access a memory free API.

Affected products

Snapdragon
  • ==WSA8840
  • ==WCD9341
  • ==QCA6430
  • ==WSA8810
  • ==X2000086
  • ==WSA8845H
  • ==SC8380XP
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==WSA8830
  • ==Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB)
  • ==Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro"
  • ==QCC2072
  • ==WSA8845
  • ==WCD9378C
  • ==XG101032
  • ==Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro"
  • ==WCD9340
  • ==WCD9385
  • ==X2000092
  • ==XG101039
  • ==QCA6420
  • ==QCA6391
  • ==X2000077
  • ==Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB)
  • ==WSA8835
  • ==XG101002
  • ==FastConnect 7800
  • ==X2000094
  • ==Snapdragon 8cx Compute Platform (SC8180X-AA, AB)
  • ==FastConnect 6800
  • ==AQT1000
  • ==WCD9380
  • ==X2000090
  • ==Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite"
  • ==WSA8815
  • ==Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
Not present in nixpkgs
Permalink CVE-2025-47402
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): ADJACENT_NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @jopejoe1 dismissed
Buffer Over-read in WLAN Firmware

Transient DOS when processing a received frame with an excessively large authentication information element.

Affected products

Snapdragon
  • ==QCA6797AQ
  • ==SA7255P
  • ==SA7775P
  • ==QCC710
  • ==SAR2130P
  • ==QCA8081
  • ==SXR2250P
  • ==XG101032
  • ==Snapdragon 8 Elite
  • ==WCD9340
  • ==SM8635P
  • ==QCN6224
  • ==QCA6391
  • ==SM8635
  • ==QCA6696
  • ==QMP1000
  • ==QCA6688AQ
  • ==XG101002
  • ==Palawan25
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==SM8650Q
  • ==SA8620P
  • ==QCA6698AQ
  • ==WCN7880
  • ==QCA6787AQ
  • ==WCN7861
  • ==WSA8840
  • ==QAMSRV1H
  • ==SRV1H
  • ==QCC2073
  • ==QCA6595
  • ==QCA6574AU
  • ==XG101039
  • ==X2000092
  • ==QCA6574
  • ==QCC2076
  • ==WCN7860
  • ==LeMans_AU_LGIT
  • ==QCA6698AU
  • ==WCN7881
  • ==SSG2125P
  • ==SM7675P
  • ==WCD9380
  • ==QAM8255P
  • ==QCA8337
  • ==SRV1M
  • ==WCD9370
  • ==QCA6777AQ
  • ==X2000086
  • ==SA8255P
  • ==FastConnect 6900
  • ==QCA6574A
  • ==WSA8845
  • ==WCD9378C
  • ==SA8770P
  • ==WCD9385
  • ==WCN6755
  • ==AR8035
  • ==Snapdragon X72 5G Modem-RF System
  • ==WCD9395
  • ==SXR1230P
  • ==SSG2115P
  • ==QCN9012
  • ==SA9000P
  • ==LeMansAU
  • ==QCS8550
  • ==Snapdragon X75 5G Modem-RF System
  • ==QCA6678AQ
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==WSA8845H
  • ==QFW7124
  • ==WSA8830
  • ==QAMSRV1M
  • ==SM8750P
  • ==QCN6274
  • ==WCD9378
  • ==QCA6564AU
  • ==WCD9375
  • ==QFW7114
  • ==FWA Gen 3 Ultra Platform
  • ==X2000077
  • ==QCN9011
  • ==WSA8835
  • ==QCA6595AU
  • ==FastConnect 7800
  • ==WSA8832
  • ==QCA6584AU
  • ==X2000094
  • ==SM7675
  • ==X2000090
  • ==Orne
  • ==Cologne
  • ==WCD9390
  • ==QCA6554A
Not present in nixpkgs
Permalink CVE-2025-47399
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @jopejoe1 dismissed
Buffer Copy Without Checking Size of Input in Camera

Memory Corruption while processing IOCTL call to update sensor property settings with invalid input parameters.

Affected products

Snapdragon
  • ==WSA8840
  • ==FastConnect 7800
  • ==XG101039
  • ==X2000092
  • ==X2000094
  • ==X2000090
  • ==WCD9378C
  • ==X2000077
  • ==X2000086
  • ==WSA8845H
  • ==WSA8845
  • ==Cologne
  • ==XG101032
  • ==XG101002
Not present in nixpkgs
Permalink CVE-2025-47358
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @jopejoe1 dismissed
Use After Free in Secure Processor

Memory Corruption when user space address is modified and passed to mem_free API, causing kernel memory to be freed inadvertently.

Affected products

Snapdragon
  • ==WSA8840
  • ==X2000086
  • ==WSA8845H
  • ==SC8380XP
  • ==FastConnect 6900
  • ==WSA8830
  • ==QCC2072
  • ==WSA8845
  • ==WCD9378C
  • ==XG101032
  • ==WCD9385
  • ==XG101039
  • ==X2000092
  • ==X2000077
  • ==Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB)
  • ==WSA8835
  • ==XG101002
  • ==FastConnect 7800
  • ==X2000094
  • ==WCD9380
  • ==X2000090
Not present in nixpkgs
Permalink CVE-2026-2186
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package go-crx3
  • @LeSuisse dismissed
Tenda RX3 SetIpMacBind fromSetIpMacBind stack-based overflow

A vulnerability has been found in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Affected products

RX3
  • ==16.03.13.11
Not present in nixpkgs
Permalink CVE-2026-2076
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse User Management Endpoint UserController.java deleteUser improper authorization

A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this vulnerability is the function addUser/updateUser/deleteUser of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component User Management Endpoint. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Not present in nixpkgs.
Permalink CVE-2026-2107
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Log Info LoginfoController.java batchDeleteLoginfo improper authorization

A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function loadAllLoginfo/deleteLoginfo/batchDeleteLoginfo of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\LoginfoController.java of the component Log Info Handler. The manipulation results in improper authorization. The attack can be launched remotely. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Not present in nixpkgs.
Permalink CVE-2026-2077
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Role Management RoleController.java deleteRole improper authorization

A security vulnerability has been detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function addRole/updateRole/deleteRole of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role Management Handler. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Not present in nixpkgs.
Permalink CVE-2026-2105
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Department Management DeptController.java deleteDept improper authorization

A flaw has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. The affected element is the function addDept/updateDept/deleteDept of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\DeptController.java of the component Department Management. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been published and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Not present in nixpkgs.
Permalink CVE-2026-2106
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package warehouse
  • @LeSuisse dismissed
yeqifu warehouse Notice Management NoticeController.java batchDeleteNotice improper authorization

A vulnerability has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. The impacted element is the function addNotice/updateNotice/deleteNotice/batchDeleteNotice of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\NoticeController.java of the component Notice Management. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

warehouse
  • ==aaf29962ba407d22d991781de28796ee7b4670e4
Not present in nixpkgs.