Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • perlPackages.NetCUPS
    • perl538Packages.NetCUPS
    • perl540Packages.NetCUPS
  • @LeSuisse dismissed
A missing encryption of sensitive data vulnerability was found in the UPS settings of ADM

When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certificate verification can allow an attacker able to intercept network traffic between the client and server can perform a man-in-the-middle (MITM) attack, which may obtain the sensitive information of the UPS server configuation. This issue affects ADM: from 4.1.0 through 4.3.3.RKD2, from 5.0.0 through 5.1.0.RN42.

Affected products

UPS
  • =<5.1.0.RN42
  • =<4.3.3.RKD2
Impacted software not present in nixpkgs
Permalink CVE-2023-0835
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package vscode-extensions.yzane.markdown-pdf
  • @LeSuisse dismissed
markdown-pdf version 11.0.0 allows an external attacker to remotely obtain …

markdown-pdf version 11.0.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the Markdown content entered by the user.

Affected products

markdown-pdf
  • ==11.0.0
Impacted software not present in nixpkgs
Permalink CVE-2025-43904
4.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • slurm-nm
    • slurm-spank-x11
    • slurm-spank-stunnel
    • prometheus-slurm-exporter
    • python312Packages.pyslurm
    • python313Packages.pyslurm
  • @LeSuisse dismissed
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting …

In SchedMD Slurm before 24.11.5, 24.05.8, and 23.11.11, the accounting system can allow a Coordinator to promote a user to Administrator.

Affected products

Slurm
  • <23.11.11
  • <24.11.5
  • <24.05.8

Matching in nixpkgs

Package maintainers

Unstable and current stable have never been impacted.
Permalink CVE-2021-47837
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.markdownify
    • python313Packages.markdownify
  • @LeSuisse dismissed
Markdownify 1.2.0 - Persistent Cross-Site Scripting

Markdownify 1.2.0 contains a persistent cross-site scripting vulnerability that allows attackers to store malicious payloads within markdown files. Attackers can upload crafted markdown files with embedded scripts that execute when the file is opened, potentially enabling remote code execution.

Affected products

Markdownify
  • ==1.2.0
Impacted software not present in nixpkgs
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    11 packages
    • python313Packages.beanhub-inbox
    • python312Packages.beanhub-inbox
    • python313Packages.pywinbox
    • python312Packages.pywinbox
    • haskellPackages.rainbox
    • haskellPackages.inbox
    • public-inbox
    • winbox4
    • winbox3
    • winbox
    • linbox
  • @LeSuisse dismissed
Multiple vulnerabilities in Viafirma products

IDOR vulnerability has been found in Viafirma Inbox v4.5.13 that allows any authenticated user without privileges in the application to list all users, access and modify their data. This allows the user's email addresses to be modified and, subsequently, using the password recovery functionality to access the application by impersonating any user, including those with administrative permissions.

Affected products

Inbox
  • ==v4.5.13
Impacted software not present in nixpkgs
Permalink CVE-2026-21281
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python312Packages.bincopy
    • python313Packages.bincopy
  • @LeSuisse dismissed
InCopy | Heap-based Buffer Overflow (CWE-122)

InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Affected products

InCopy
  • =<19.5.5
Impacted software not present in nixpkgs
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 packages
    • python313Packages.pan-os-python
    • python312Packages.pan-os-python
  • @LeSuisse dismissed
PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

Affected products

PAN-OS
  • <11.1.13, 11.1.10-h9, 11.1.6-h23, 11.1.4-h27
  • <11.2.10-h2, 11.2.7-h8, 11.2.4-h15
  • <10.2.18-h1, 10.2.16-h6, 10.2.13-h18, 10.2.10-h30, 10.2.7-h32
  • <10.1.14-h20
  • <12.1.4, 12.1.3-h3
Cloud NGFW
  • ==All
Prisma Access
  • <11.2.7-h8
  • <10.2.10-h29
  • <10.2.10-h29, 10.2.4-h43
Software not present in nixpkgs
Permalink CVE-2025-14822
3.1 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • python312Packages.mattermostdriver
    • python313Packages.mattermostdriver
    • mattermost-desktop
  • @LeSuisse dismissed
DoS from quadratic complexity in model.ParseHashtags

Mattermost versions 10.11.x <= 10.11.8 fail to validate input size before processing hashtags which allows an authenticated attacker to exhaust CPU resources via a single HTTP request containing a post with thousands space-separated tokens

Affected products

Mattermost
  • ==10.11.9
  • ==11.2.0
  • =<10.11.8

Matching in nixpkgs

pkgs.mattermost

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

pkgs.mattermostLatest

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

Package maintainers

Already fixed in unstable and stable branches.
Permalink CVE-2025-14435
6.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    5 packages
    • python312Packages.mattermostdriver
    • python313Packages.mattermostdriver
    • mattermost-desktop
    • mattermostLatest
    • mattermost
  • @LeSuisse added
    2 packages
    • mattermostLatest
    • mattermost
  • @LeSuisse dismissed
Application-Level DoS via infinite re-render loop in user profile handling

Mattermost versions 10.11.x <= 10.11.8, 11.1.x <= 11.1.1, 11.0.x <= 11.0.6 fail to prevent infinite re-renders on API errors which allows authenticated users to cause application-level DoS via triggering unbounded component re-render loops.

Affected products

Mattermost
  • ==11.0.7
  • =<11.0.6
  • ==11.2.0
  • =<10.11.8
  • ==10.11.9
  • =<11.1.1
  • ==11.1.2

Matching in nixpkgs

pkgs.mattermost

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

pkgs.mattermostLatest

Mattermost is an open source platform for secure collaboration across the entire software development lifecycle

Package maintainers

Already fixed in unstable and stable branches.
Permalink CVE-2025-31186
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    12 packages
    • xcodes
    • xcodegen
    • xcode-install
    • rubyPackages.xcodeproj
    • rubyPackages_3_1.xcodeproj
    • rubyPackages_3_2.xcodeproj
    • rubyPackages_3_3.xcodeproj
    • rubyPackages_3_4.xcodeproj
    • rubyPackages_3_5.xcodeproj
    • darwin.xcodeProjectCheckHook
    • python312Packages.latexcodec
    • python313Packages.latexcodec
  • @LeSuisse dismissed
A permissions issue was addressed with additional restrictions. This issue …

A permissions issue was addressed with additional restrictions. This issue is fixed in Xcode 16.3. An app may be able to bypass Privacy preferences.

Affected products

Xcode
  • <16.3
Unfree, more recent versions are already available