Nixpkgs Security Tracker

Login with GitHub

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Permalink CVE-2026-3845
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    21 packages
    • firefoxpwa
    • faust2firefox
    • firefox_decrypt
    • pkgsRocm.firefox
    • firefox-gnome-theme
    • firefox-sync-client
    • pkgsRocm.firefoxpwa
    • firefox-esr-unwrapped
    • pkgsRocm.firefox-beta
    • firefox-beta-unwrapped
    • pkgsRocm.firefox-mobile
    • firefox-esr-140-unwrapped
    • pkgsRocm.firefox-unwrapped
    • pkgsRocm.firefox-devedition
    • firefox-devedition-unwrapped
    • pkgsRocm.firefox-beta-unwrapped
    • gnomeExtensions.firefox-profiles
    • pkgsRocm.firefox-devedition-unwrapped
    • gnomeExtensions.firefox-pip-always-on-top
    • gnomeExtensions.pip-alwaysontop-for-firefox
    • vscode-extensions.firefox-devtools.vscode-firefox-debug
  • @mweinelt dismissed
Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox < 148.0.2.

Affected products

Firefox
  • <148.0.2

Matching in nixpkgs

Ignored packages (21)

Package maintainers

https://github.com/NixOS/nixpkgs/pull/498530
https://github.com/NixOS/nixpkgs/pull/498671
Permalink CVE-2026-3847
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    21 packages
    • firefoxpwa
    • faust2firefox
    • firefox_decrypt
    • pkgsRocm.firefox
    • firefox-gnome-theme
    • firefox-sync-client
    • pkgsRocm.firefoxpwa
    • firefox-esr-unwrapped
    • pkgsRocm.firefox-beta
    • firefox-beta-unwrapped
    • pkgsRocm.firefox-mobile
    • firefox-esr-140-unwrapped
    • pkgsRocm.firefox-unwrapped
    • pkgsRocm.firefox-devedition
    • firefox-devedition-unwrapped
    • pkgsRocm.firefox-beta-unwrapped
    • gnomeExtensions.firefox-profiles
    • pkgsRocm.firefox-devedition-unwrapped
    • gnomeExtensions.firefox-pip-always-on-top
    • gnomeExtensions.pip-alwaysontop-for-firefox
    • vscode-extensions.firefox-devtools.vscode-firefox-debug
  • @mweinelt dismissed
Memory safety bugs fixed in Firefox 148.0.2

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.0.2.

Affected products

Firefox
  • <148.0.2

Matching in nixpkgs

Ignored packages (21)

Package maintainers

https://github.com/NixOS/nixpkgs/pull/498530
https://github.com/NixOS/nixpkgs/pull/498671
Permalink CVE-2026-3846
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 1 week, 4 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    21 packages
    • firefoxpwa
    • faust2firefox
    • firefox_decrypt
    • pkgsRocm.firefox
    • firefox-gnome-theme
    • firefox-sync-client
    • pkgsRocm.firefoxpwa
    • firefox-esr-unwrapped
    • pkgsRocm.firefox-beta
    • firefox-beta-unwrapped
    • pkgsRocm.firefox-mobile
    • firefox-esr-140-unwrapped
    • pkgsRocm.firefox-unwrapped
    • pkgsRocm.firefox-devedition
    • firefox-devedition-unwrapped
    • pkgsRocm.firefox-beta-unwrapped
    • gnomeExtensions.firefox-profiles
    • pkgsRocm.firefox-devedition-unwrapped
    • gnomeExtensions.firefox-pip-always-on-top
    • gnomeExtensions.pip-alwaysontop-for-firefox
    • vscode-extensions.firefox-devtools.vscode-firefox-debug
  • @mweinelt dismissed
Same-origin policy bypass in the CSS Parsing and Computation component

Same-origin policy bypass in the CSS Parsing and Computation component. This vulnerability affects Firefox < 148.0.2.

Affected products

Firefox
  • <148.0.2

Matching in nixpkgs

Ignored packages (21)

Package maintainers

https://github.com/NixOS/nixpkgs/pull/498530
https://github.com/NixOS/nixpkgs/pull/498671
Permalink CVE-2026-3739
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    7 packages
    • mautrix-gmessages
    • ayatana-indicator-messages
    • graylogPlugins.filter-messagesize
    • python312Packages.teamcity-messages
    • python313Packages.teamcity-messages
    • python314Packages.teamcity-messages
    • chickenPackages_5.chickenEggs.messages
  • @mweinelt dismissed
suitenumerique messages ThreadAccess serializers.py ThreadAccessSerializer improper authentication

A security flaw has been discovered in suitenumerique messages 0.2.0. This issue affects the function ThreadAccessSerializer of the file src/backend/core/api/serializers.py of the component ThreadAccess. The manipulation results in improper authentication. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.3.0 is capable of addressing this issue. The patch is identified as d7729f4b885449f6dee3faf8b5f2a05769fb3d6e. The affected component should be upgraded.

Affected products

messages
  • ==0.3.0
  • ==0.2.0
Ignored packages (7)
Not in nixpkgs
Permalink CVE-2026-3713
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 week, 6 days ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    6 packages
    • libpng12
    • perlPackages.ImagePNGLibpng
    • perl5Packages.ImagePNGLibpng
    • perl538Packages.ImagePNGLibpng
    • perl540Packages.ImagePNGLibpng
    • tests.pkg-config.defaultPkgConfigPackages.libpng
  • @mweinelt dismissed
pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow

A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

libpng
  • ==1.6.9
  • ==1.6.28
  • ==1.6.39
  • ==1.6.29
  • ==1.6.45
  • ==1.6.55
  • ==1.6.32
  • ==1.6.19
  • ==1.6.5
  • ==1.6.34
  • ==1.6.35
  • ==1.6.17
  • ==1.6.21
  • ==1.6.33
  • ==1.6.3
  • ==1.6.4
  • ==1.6.15
  • ==1.6.22
  • ==1.6.23
  • ==1.6.37
  • ==1.6.53
  • ==1.6.7
  • ==1.6.30
  • ==1.6.51
  • ==1.6.10
  • ==1.6.2
  • ==1.6.12
  • ==1.6.6
  • ==1.6.48
  • ==1.6.16
  • ==1.6.0
  • ==1.6.8
  • ==1.6.25
  • ==1.6.52
  • ==1.6.13
  • ==1.6.41
  • ==1.6.20
  • ==1.6.1
  • ==1.6.50
  • ==1.6.40
  • ==1.6.46
  • ==1.6.36
  • ==1.6.11
  • ==1.6.27
  • ==1.6.18
  • ==1.6.47
  • ==1.6.49
  • ==1.6.26
  • ==1.6.24
  • ==1.6.38
  • ==1.6.14
  • ==1.6.44
  • ==1.6.54
  • ==1.6.31
  • ==1.6.42
  • ==1.6.43

Matching in nixpkgs

Ignored packages (6)

Package maintainers

Only in contrib, not built in our packages.
Permalink CVE-2026-30851
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
updated 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    7 packages
    • xcaddy
    • caddyfile-language-server
    • vimPlugins.nvim-treesitter-parsers.caddy
    • tree-sitter-grammars.tree-sitter-caddyfile
    • vscode-extensions.matthewpi.caddyfile-support
    • python313Packages.tree-sitter-grammars.tree-sitter-caddyfile
    • python314Packages.tree-sitter-grammars.tree-sitter-caddyfile
  • @mweinelt dismissed
Caddy forward_auth copy_headers Does Not Strip Client-Supplied Headers, Allowing Identity Injection and Privilege Escalation

Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has been patched in version 2.11.2.

Affected products

caddy
  • ==>= 2.10.0, < 2.11.2

Matching in nixpkgs

Ignored packages (7)

Package maintainers

NixOS Unstable: https://github.com/NixOS/nixpkgs/pull/497116
NixOS 25.11: https://github.com/NixOS/nixpkgs/pull/497197
Permalink CVE-2026-29784
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    23 packages
    • ghost
    • ghostie
    • ghostty
    • ghost-cli
    • ghostfolio
    • ghostunnel
    • ghostscript
    • ghosttohugo
    • ghostty-bin
    • ghostscriptX
    • ghostscript_headless
    • libsForQt5.ghostwriter
    • kdePackages.ghostwriter
    • plasma5Packages.ghostwriter
    • haskellPackages.ghost-buster
    • python312Packages.ghostscript
    • python313Packages.ghostscript
    • python314Packages.ghostscript
    • tests.texlive.dvipng.ghostscript
    • haskellPackages.ghostscript-parallel
    • tree-sitter-grammars.tree-sitter-ghostty
    • python313Packages.tree-sitter-grammars.tree-sitter-ghostty
    • python314Packages.tree-sitter-grammars.tree-sitter-ghostty
  • @mweinelt dismissed
Ghost: Incomplete CSRF protections around OTC use

Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.

Affected products

Ghost
  • ==>= 5.101.6, < 6.19.3
Ignored packages (23)
Not in nixpkgs
updated 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    7 packages
    • xcaddy
    • caddyfile-language-server
    • vimPlugins.nvim-treesitter-parsers.caddy
    • tree-sitter-grammars.tree-sitter-caddyfile
    • vscode-extensions.matthewpi.caddyfile-support
    • python313Packages.tree-sitter-grammars.tree-sitter-caddyfile
    • python314Packages.tree-sitter-grammars.tree-sitter-caddyfile
  • @mweinelt dismissed
Caddy: vars_regexp double-expands user input, leaking env vars and files

Caddy is an extensible server platform that uses TLS by default. From version 2.7.5 to before version 2.11.2, the vars_regexp matcher in vars.go:337 double-expands user-controlled input through the Caddy replacer. When vars_regexp matches against a placeholder like {http.request.header.X-Input}, the header value gets resolved once (expected), then passed through repl.ReplaceAll() again (the bug). This means an attacker can put {env.DATABASE_URL} or {file./etc/passwd} in a request header and the server will evaluate it, leaking environment variables, file contents, and system info. This issue has been patched in version 2.11.2.

Affected products

caddy
  • ==>= 2.7.5, < 2.11.2

Matching in nixpkgs

Ignored packages (7)

Package maintainers

NixOS Unstable: https://github.com/NixOS/nixpkgs/pull/497116
NixOS 25.11: https://github.com/NixOS/nixpkgs/pull/497197
Permalink CVE-2026-30829
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed package checkmate
  • @mweinelt dismissed
Checkmate: Unauthenticated Access to Unpublished Status Page

Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. Prior to version 3.4.0, an unauthenticated information disclosure vulnerability exists in the GET /api/v1/status-page/:url endpoint. The endpoint does not enforce authentication or verify whether a status page is published before returning full status page details. As a result, unpublished status pages and their associated internal data are accessible to any unauthenticated user via direct API requests. This issue has been patched in version 3.4.0.

Affected products

Checkmate
  • ==< 3.4.0
Ignored packages (1)
Not in nixpkgs
Permalink CVE-2026-28680
9.3 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 weeks ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt dismissed
Ghostfolio: Full-Read SSRF in Manual Asset Import

Ghostfolio is an open source wealth management software. Prior to version 2.245.0, an attacker can exploit the manual asset import feature to perform a full-read SSRF, allowing them to exfiltrate sensitive cloud metadata (IMDS) or probe internal network services. This issue has been patched in version 2.245.0.

Affected products

ghostfolio
  • ==< 2.245.0

Matching in nixpkgs

Package maintainers

NixOS Unstable: https://github.com/NixOS/nixpkgs/pull/496350
NixOS 25.11: https://github.com/NixOS/nixpkgs/pull/497610