Nixpkgs security tracker

Login with GitHub

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-42086
4.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 1 day, 4 hours ago Activity log
  • Created suggestion
OpenC3 COSMOS: Self-XSS in the Command Sender

OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. Prior to version 7.0.0, the Command Sender UI uses an unsafe eval() function on array-like command parameters, which allows a user-supplied payload to execute in the browser when sending a command. This creates a self-XSS risk because an attacker can trigger their own script execution in the victim’s session, if allowed to influence the array parameter input, for example via phishing. If successful, an attacker may read or modify data in the authenticated browser context, including session tokens in local storage. This issue has been patched in version 7.0.0.

Affected products

cosmos
  • ==< 7.0.0

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-7535
4.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 day, 4 hours ago Activity log
  • Created suggestion
Open5GS transfer-update denial of service

A vulnerability was found in Open5GS up to 2.7.7. This affects the function amf_namf_comm_handle_registration_status_update_request in the library /lib/app/ogs-init.c of the file /namf-comm/v1/ue-contexts/{ueContextId}/transfer-update. Performing a manipulation of the argument ueContextId results in denial of service. The attack can be initiated remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.2
  • ==2.7.5
  • ==2.7.1
  • ==2.7.3
  • ==2.7.6
  • ==2.7.7

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-7737
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 day, 4 hours ago Activity log
  • Created suggestion
osrg GoBGP BMP Parser bmp.go BMPStatisticsReport.ParseBody out-of-bounds

A vulnerability was identified in osrg GoBGP up to 4.3.0. Affected by this issue is the function BMPPeerUpNotification.ParseBody/BMPStatisticsReport.ParseBody of the file pkg/packet/bmp/bmp.go of the component BMP Parser. The manipulation leads to out-of-bounds read. The attack can be initiated remotely. Upgrading to version 4.4.0 can resolve this issue. The identifier of the patch is bc77597d42335c78464bc8e15a471d887bbdf260. Upgrading the affected component is recommended.

Affected products

GoBGP
  • ==4.0
  • ==4.3.0
  • ==4.4.0
  • ==4.2
  • ==4.1

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-29514
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 day, 4 hours ago Activity log
  • Created suggestion
NetBox 4.3.5 - 4.5.4 RCE via RenderTemplateMixin

NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the environment_params field. Attackers can bypass Jinja2 SandboxedEnvironment protections by setting the finalize parameter to any importable Python callable such as subprocess.getoutput, which is invoked on every rendered expression outside the sandbox's call interception mechanism, achieving remote code execution as the NetBox service user.

Affected products

netbox
  • =<4.5.4

Matching in nixpkgs

pkgs.netbox

IP address management (IPAM) and data center infrastructure management (DCIM) tool

pkgs.netbox_4_2

IP address management (IPAM) and data center infrastructure management (DCIM) tool

pkgs.netbox_4_3

IP address management (IPAM) and data center infrastructure management (DCIM) tool

pkgs.netbox_4_4

IP address management (IPAM) and data center infrastructure management (DCIM) tool

pkgs.netbox_4_5

IP address management (IPAM) and data center infrastructure management (DCIM) tool

pkgs.pkgsRocm.netbox

IP address management (IPAM) and data center infrastructure management (DCIM) tool

Permalink CVE-2025-47407
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 day, 4 hours ago Activity log
  • Created suggestion
Time-of-check Time-of-use (TOCTOU) Race Condition in DSP Service

Memory corruption while creating a process on the digital signal processor due to allocation failure at the kernel level.

Affected products

Snapdragon
  • ==WSA8835
  • ==SM6225P
  • ==G2 Gen 1
  • ==SW5100
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==SD662
  • ==QPA1086BD
  • ==Orne
  • ==QLN1083BD
  • ==XRV9209
  • ==SM8845P
  • ==SM8735P
  • ==SM8750P
  • ==SAR2130P
  • ==QMP2001
  • ==Snapdragon XR2 5G Platform
  • ==SAR1165P
  • ==Snapdragon 685 4G Mobile Platform
  • ==WCD9380
  • ==QXM1096
  • ==SM7435
  • ==Snapdragon 8 Elite Gen 5
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==X1E80100
  • ==WCD9375
  • ==WCN7860
  • ==Palawan25
  • ==WSA8850
  • ==QCM4325
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==QCS2290
  • ==Snapdragon 680 4G Mobile Platform
  • ==Snapdragon 8 Elite
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==SXR2330P
  • ==WCD9370
  • ==WCN3950
  • ==WSA8855C
  • ==SC8380XP
  • ==SXR2250P
  • ==QXM1086
  • ==QXM1095
  • ==WSA8832
  • ==QCA6391
  • ==QPA1083BD
  • ==QCM2290
  • ==QMB715
  • ==WCN7881
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==QXM1083
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==WCN6755
  • ==FastConnect 7800
  • ==SM7635P
  • ==WCD9385
  • ==WCN3980
  • ==SM6850
  • ==WSA8810
  • ==Themisto
  • ==QXM1093
  • ==Netrani
  • ==Molokai
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==CQ7790
  • ==Snapdragon 460 Mobile Platform
  • ==WSA8815
  • ==Snapdragon 662 Mobile Platform
  • ==FastConnect 6200
  • ==QXM1094
  • ==WSA8845H
  • ==WSA8850W
  • ==QCS4290
  • ==SM7435P
  • ==Snapdragon Wear Elite platform
  • ==CQ8725S
  • ==FastConnect 6700
  • ==SW5100P
  • ==SXR2350P
  • ==WCN7861
  • ==SM6450P
  • ==WSA8845
  • ==QLN1086BD
  • ==SXR2230P
  • ==WSA8840
  • ==SD865 5G
  • ==WCD9395
  • ==WCN7880
  • ==WCD9378
  • ==WCN6450
  • ==WSA8830
  • ==SM6475Q
  • ==FastConnect 6900
  • ==Pandeiro
  • ==SM6475P
  • ==QMP1000
  • ==WCN3988
  • ==Snapdragon 7 Gen 4 Mobile Platform
  • ==XRV7209
  • ==WCN7760

Matching in nixpkgs

Permalink CVE-2026-7724
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 day, 4 hours ago Activity log
  • Created suggestion
PrefectHQ prefect Webhook/Notification validate_restricted_url toctou

A vulnerability has been found in PrefectHQ prefect up to 3.6.28.dev1. Affected by this vulnerability is the function validate_restricted_url of the component Webhook/Notification. The manipulation leads to time-of-check time-of-use. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 3.6.28.dev2 addresses this issue. The identifier of the patch is 7c70ac54a5e101431d83b9f2681ec88d5e0021ed. Upgrading the affected component is advised. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.28.dev1
  • ==3.6.28.dev2

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers

Permalink CVE-2026-7722
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 day, 4 hours ago Activity log
  • Created suggestion
PrefectHQ prefect Health Check API health endswith improper authentication

A vulnerability was detected in PrefectHQ prefect up to 3.6.21. This impacts the function endswith of the file /api/health of the component Health Check API. Performing a manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit is now public and may be used. Upgrading to version 3.6.22 will fix this issue. The patch is named e21617125335025b4b27e7d6f0ca028e8e8f3b79. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

prefect
  • ==3.6.6
  • ==3.6.21
  • ==3.6.4
  • ==3.6.20
  • ==3.6.9
  • ==3.6.14
  • ==3.6.12
  • ==3.6.8
  • ==3.6.16
  • ==3.6.1
  • ==3.6.0
  • ==3.6.13
  • ==3.6.17
  • ==3.6.15
  • ==3.6.18
  • ==3.6.19
  • ==3.6.10
  • ==3.6.2
  • ==3.6.3
  • ==3.6.5
  • ==3.6.22
  • ==3.6.7
  • ==3.6.11

Matching in nixpkgs

pkgs.prefect

Workflow orchestration framework for building resilient data pipelines in Python

Package maintainers

created 1 day, 4 hours ago Activity log
  • Created suggestion
n8n: Unauthenticated Denial of Service via MCP Client Registration

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Affected products

n8n
  • ==>= 2.18.0, < 2.18.1
  • ==< 1.123.32
  • ==>= 2.17.0, < 2.17.4

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Package maintainers

Permalink CVE-2026-25266
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 day, 4 hours ago Activity log
  • Created suggestion
Exposed dangerous function in windows host

Memory corruption while processing IOCTL command when device is in power-save state.

Affected products

Snapdragon
  • ==WSA8835
  • ==X2000077
  • ==WSA8845H
  • ==X2000090
  • ==X2000094
  • ==FastConnect 7800
  • ==WCN7861
  • ==WCD9385
  • ==WSA8845
  • ==XG101032
  • ==X2000086
  • ==Cologne
  • ==WSA8840
  • ==XG101002
  • ==WCN7880
  • ==X2000092
  • ==XG101039
  • ==SC8380XP
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WSA8830
  • ==FastConnect 6900
  • ==WCD9380
  • ==WCD9378C
  • ==WSA8832

Matching in nixpkgs

Permalink CVE-2026-42146
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 day, 4 hours ago Activity log
  • Created suggestion
CImg Library: Uncontrolled memory allocation via nb_colors field in _load_bmp

CImg Library is a C++ library for image processing. Prior to commit c3aacf5, the nb_colors field read from the BMP file header is used directly to compute an allocation size without validating it against the remaining file size. A crafted BMP file with a large nb_colors value triggers an out-of-memory condition, crashing any application that uses CImg to load untrusted BMP files. This issue has been patched via commit c3aacf5.

Affected products

CImg
  • ==< c3aacf5b96ac1e54b7af1957c6737dbf3949f6d3

Matching in nixpkgs

pkgs.cimg

Small, open source, C++ toolkit for image processing