Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • icinga2-agent
    • terraform-providers.icinga2
    • terraform-providers.icinga_icinga2
  • @LeSuisse dismissed
Icinga has insecure permission of %ProgramData%\icinga2\var on Windows

Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%\icinga2\var` folder on Windows. This resulted in the its contents - including the private key of the user and synced configuration - being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:\ProgramData\icinga2\var` (and `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.

Affected products

icinga2
  • ==>= 2.14.0, < 2.14.8
  • ==>= 2.3.0, < 2.13.14
  • ==>= 2.15.0, < 2.15.2

Matching in nixpkgs

Package maintainers

Windows only issue, not an issue for nixpkgs
Permalink CVE-2026-24845
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package malcontent-ui
  • @LeSuisse accepted
  • @LeSuisse removed package malcontent
  • @LeSuisse dismissed
malcontent's OCI image scanning could expose registry credentials

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-containerregistry for OCI image pulls, which by default uses the Docker credential keychain. A malicious registry could return a `WWW-Authenticate` header redirecting token authentication to an attacker-controlled endpoint, causing credentials to be sent to that endpoint. Version 1.20.3 fixes the issue by defaulting to anonymous auth for OCI pulls.

Affected products

malcontent
  • ==>= 0.10.0, < 1.20.3
Chainguard malcontent is not present in nixpkgs.
Permalink CVE-2026-24846
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • malcontent-ui
    • malcontent
  • @LeSuisse dismissed
malcontent's archive extraction could write outside extraction directory

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `handleSymlink` function received arguments in the wrong order, causing the symlink target to be used as the symlink location. Additionally, symlink targets were not validated to ensure they resolved within the extraction directory. Version 1.20.3 introduces fixes that swap handleSymlink arguments, validate symlink location, and validate symlink targets that resolve within an extraction directory.

Affected products

malcontent
  • ==>= 1.8.0, < 1.20.3
Chainguard malcontent is not present in nixpkgs.
Permalink CVE-2026-24854
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    4 packages
    • ocrmypdf
    • python312Packages.ocrmypdf
    • python313Packages.ocrmypdf
    • wordpressPackages.plugins.civicrm
  • @LeSuisse dismissed
Church CRM has SQL injection in PaddleNumEditor.php

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQL injection through the `PerID` parameter. Version 6.7.2 contains a patch for the issue.

Affected products

CRM
  • ==< 6.7.2
Not present in nixpkgs
Permalink CVE-2020-36966
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse dismissed
Dolibarr 11.0.3 - 'ldap.php' - Persistent Cross-Site Scripting

Dolibarr 11.0.3 contains a persistent cross-site scripting vulnerability in LDAP synchronization settings that allows attackers to inject malicious scripts through multiple parameters. Attackers can exploit the host, slave, and port parameters in /dolibarr/admin/ldap.php to execute arbitrary JavaScript and potentially steal user cookie information.

Affected products

Dolibarr
  • =<11.0.3

Matching in nixpkgs

pkgs.dolibarr

Enterprise resource planning (ERP) and customer relationship manager (CRM) server

Package maintainers

Current stable was never impacted
Permalink CVE-2025-47363
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package snapdragon-profiler
  • @LeSuisse dismissed
Integer Overflow or Wraparound in Automotive

Memory corruption when calculating oversized partition sizes without proper checks.

Affected products

Snapdragon
  • ==QAMSRV1H
  • ==QCA6797AQ
  • ==SA7255P
  • ==QAM8255P
  • ==QAM8295P
  • ==SA7775P
  • ==SRV1L
  • ==SRV1M
  • ==SA8295P
  • ==SA8145P
  • ==SA6155P
  • ==SA8255P
  • ==SRV1H
  • ==QAM8775P
  • ==SA6150P
  • ==SA8195P
  • ==QAMSRV1M
  • ==QAM8620P
  • ==QCA6595
  • ==QAM8650P
  • ==QCA6574AU
  • ==SA8770P
  • ==QCA8695AU
  • ==QCA6696
  • ==SA8650P
  • ==SA8775P
  • ==SA6145P
  • ==SA8155P
  • ==QCA6688AQ
  • ==QCA6595AU
  • ==SA9000P
  • ==SA8150P
  • ==SA8540P
  • ==SA8620P
  • ==QCA6698AQ
Not present in nixpkgs
Permalink CVE-2022-50897
6.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package termpdfpy
  • @LeSuisse dismissed
mPDF 7.0 - Local File Inclusion

mPDF 7.0 contains a local file inclusion vulnerability that allows attackers to read arbitrary system files by manipulating annotation file parameters. Attackers can generate URL-encoded or base64 payloads to include local files through crafted annotation content with file path specifications.

Affected products

mPDF
  • ==7.0
Not present in nixpkgs
Permalink CVE-2025-47366
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @LeSuisse dismissed
Exposed Dangerous Method or Function in HLOS

Cryptographic issue when a Trusted Zone with outdated code is triggered by a HLOS providing incorrect input.

Affected products

Snapdragon
  • ==QCA6797AQ
  • ==QRB5165M
  • ==SA7255P
  • ==QAM8295P
  • ==SA7775P
  • ==SA4150P
  • ==SG4150P
  • ==SXR2230P
  • ==QCC710
  • ==SA8295P
  • ==QCS9100
  • ==SW5100P
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==QAM8775P
  • ==QCA8081
  • ==QRU1062
  • ==SA6150P
  • ==SA8195P
  • ==SXR2250P
  • ==QRU1052
  • ==Snapdragon 460 Mobile Platform
  • ==SM7635
  • ==Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
  • ==Snapdragon AR1 Gen 1 Platform "Luna1"
  • ==WCD9340
  • ==WCN6740
  • ==SM8635P
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==QCN6224
  • ==SW5100
  • ==QCA6391
  • ==SM8635
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==QCA6696
  • ==QMP1000
  • ==WCN3910
  • ==Snapdragon X35 5G Modem-RF System
  • ==QCA6688AQ
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==QDX1010
  • ==QCM5430
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==SM8650Q
  • ==QRB5165N
  • ==SA8540P
  • ==SA8620P
  • ==SM7435
  • ==QDX1011
  • ==WCN7750
  • ==QCA6698AQ
  • ==WCN7880
  • ==WCN7861
  • ==WSA8840
  • ==QAMSRV1H
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==QCM4490
  • ==SRV1H
  • ==SM6225P
  • ==SM4635
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==SM8750
  • ==QCA6595
  • ==QCA6574AU
  • ==QCA8695AU
  • ==WCN6650
  • ==QCA6574
  • ==WCN7860
  • ==SA8155P
  • ==SA4155P
  • ==WCN7881
  • ==Snapdragon 685 4G Mobile Platform (SM6225-AD)
  • ==SSG2125P
  • ==SM7675P
  • ==Snapdragon AR2 Gen 1 Platform
  • ==WCD9380
  • ==WCN3988
  • ==SXR2330P
  • ==Snapdragon X32 5G Modem-RF System
  • ==QAM8255P
  • ==QCA8337
  • ==SRV1L
  • ==QEP8111
  • ==SRV1M
  • ==WCD9370
  • ==SA6155P
  • ==SA8255P
  • ==SC8380XP
  • ==SM8735
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==SXR2350P
  • ==QCA6574A
  • ==WSA8845
  • ==FastConnect 6700
  • ==QCS4490
  • ==SA8770P
  • ==WCD9385
  • ==WCN6755
  • ==QCM6490
  • ==AR8035
  • ==QCS615
  • ==Robotics RB5 Platform
  • ==Snapdragon X72 5G Modem-RF System
  • ==WCD9395
  • ==SXR1230P
  • ==SA6145P
  • ==SSG2115P
  • ==QCN9012
  • ==SA9000P
  • ==SM6650
  • ==SA8150P
  • ==QCS6490
  • ==Snapdragon 695 5G Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==Flight RB5 5G Platform
  • ==SM7635P
  • ==Snapdragon X75 5G Modem-RF System
  • ==QCA6678AQ
  • ==QRU1032
  • ==WSA8810
  • ==SD 8 Gen1 5G
  • ==Snapdragon AR1 Gen 1 Platform
  • ==SM8475P
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==SA8145P
  • ==WSA8845H
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==QFW7124
  • ==WCN3950
  • ==QCA6174A
  • ==Snapdragon 480 5G Mobile Platform
  • ==WSA8830
  • ==QAMSRV1M
  • ==QAM8620P
  • ==QAM8650P
  • ==Snapdragon 680 4G Mobile Platform
  • ==QCS7230
  • ==SM8750P
  • ==QCN6274
  • ==SM6650P
  • ==Snapdragon 662 Mobile Platform
  • ==WCD9378
  • ==QCS5430
  • ==QDU1010
  • ==WCD9375
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==QFW7114
  • ==SM6475
  • ==QCN9011
  • ==SA8650P
  • ==SA8775P
  • ==WSA8835
  • ==QCA6595AU
  • ==FastConnect 7800
  • ==WSA8832
  • ==QCA6584AU
  • ==SM7675
  • ==WSA8815
  • ==WCD9390
Not present in nixpkgs
Permalink CVE-2025-47364
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @LeSuisse dismissed
Integer Overflow or Wraparound in Automotive

Memory corruption while calculating offset from partition start point.

Affected products

Snapdragon
  • ==QAMSRV1H
  • ==QCA6797AQ
  • ==SA7255P
  • ==QAM8255P
  • ==QAM8295P
  • ==SA7775P
  • ==SRV1L
  • ==SRV1M
  • ==SA8295P
  • ==SA8145P
  • ==SA6155P
  • ==SA8255P
  • ==SRV1H
  • ==QAM8775P
  • ==SA6150P
  • ==SA8195P
  • ==QAMSRV1M
  • ==QAM8620P
  • ==QCA6595
  • ==QAM8650P
  • ==QCA6574AU
  • ==SA8770P
  • ==QCA8695AU
  • ==QCA6696
  • ==SA8650P
  • ==SA8775P
  • ==SA6145P
  • ==SA8155P
  • ==QCA6688AQ
  • ==QCA6595AU
  • ==SA9000P
  • ==SA8150P
  • ==SA8540P
  • ==SA8620P
  • ==QCA6698AQ
Not present in nixpkgs
Permalink CVE-2025-47398
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package snapdragon-profiler
  • @LeSuisse dismissed
Use After Free in Graphics

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

Affected products

Snapdragon
  • ==QCA6797AQ
  • ==SA7255P
  • ==QAM8295P
  • ==SA7775P
  • ==SXR2230P
  • ==Smart Audio 400 Platform
  • ==SAR2130P
  • ==SA8295P
  • ==WCD9335
  • ==SW5100P
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==SA8195P
  • ==SXR2250P
  • ==Snapdragon 460 Mobile Platform
  • ==Snapdragon 8 Elite
  • ==SM8635P
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==G2 Gen 1
  • ==SW5100
  • ==Netrani
  • ==QCA6391
  • ==SM8635
  • ==QCA6696
  • ==QMP1000
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==WCN3910
  • ==QCA6688AQ
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==QCM5430
  • ==Palawan25
  • ==SM7550
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==SM8650Q
  • ==QRB5165N
  • ==SA8620P
  • ==SM7435
  • ==QCA6698AQ
  • ==WCN7880
  • ==WCN7861
  • ==WSA8840
  • ==QAMSRV1H
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==AR8031
  • ==CSRA6620
  • ==Robotics RB2 Platform
  • ==QCM4490
  • ==SRV1H
  • ==CSRA6640
  • ==SM6225P
  • ==G1 Gen 1
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QCA6595
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCA6574AU
  • ==QCA8695AU
  • ==Monaco_IOT
  • ==Snapdragon 660 Mobile Platform
  • ==WCN6650
  • ==QCA6574
  • ==WCN7860
  • ==LeMans_AU_LGIT
  • ==QCA6698AU
  • ==SA8155P
  • ==WCN7881
  • ==SSG2125P
  • ==SM7675P
  • ==WCD9380
  • ==WCN3988
  • ==SXR2330P
  • ==SDA660
  • ==QAM8255P
  • ==WCD9341
  • ==IQ6 Series Platform
  • ==QCA2066
  • ==SRV1M
  • ==WCD9370
  • ==QCS410
  • ==SA6155P
  • ==SA8255P
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==SXR2350P
  • ==QCA6574A
  • ==QCM2290
  • ==WSA8845
  • ==FastConnect 6700
  • ==QCS4490
  • ==SA8770P
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==WCD9385
  • ==WCN6755
  • ==QCM6490
  • ==Robotics RB5 Platform
  • ==SD662
  • ==QCS2290
  • ==WCD9395
  • ==SXR1230P
  • ==SSG2115P
  • ==QCN9012
  • ==SA9000P
  • ==QCS4290
  • ==LeMansAU
  • ==Snapdragon 695 5G Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==Flight RB5 5G Platform
  • ==SM7635P
  • ==QCS8550
  • ==IQ9 Series Platform
  • ==QCA6678AQ
  • ==WSA8810
  • ==SD 8 Gen1 5G
  • ==Snapdragon AR1 Gen 1 Platform
  • ==SM8475P
  • ==WCN3980
  • ==WSA8845H
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==WCN3950
  • ==Snapdragon 480 5G Mobile Platform
  • ==WSA8830
  • ==Milos
  • ==QAMSRV1M
  • ==QCM6125
  • ==Snapdragon 680 4G Mobile Platform
  • ==QCM4325
  • ==WCD9371
  • ==SM8750P
  • ==SM6650P
  • ==Snapdragon 662 Mobile Platform
  • ==WCD9378
  • ==WCD9375
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==QCN9011
  • ==SM8550P
  • ==SM7550P
  • ==WSA8835
  • ==QCA6595AU
  • ==FastConnect 7800
  • ==WSA8832
  • ==IQ8 Series Platform
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM7675
  • ==Orne
  • ==WCN3990
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==Snapdragon 685 4G Mobile Platform
  • ==WSA8815
  • ==WCD9390
Not present in nixpkgs