Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Dismissed suggestions

These automatic suggestions were dismissed after initial triaging.

to select a suggestion for revision.

View:
Compact
Detailed
Dismissed
(exclusively hosted service)
Permalink CVE-2026-26124
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago
Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability

Affected products

Microsoft ACI Confidential Containers
  • ==-
Dismissed
(exclusively hosted service)
Permalink CVE-2026-26125
8.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago
Payment Orchestrator Service Elevation of Privilege Vulnerability

Payment Orchestrator Service Elevation of Privilege Vulnerability

Affected products

Payment Orchestrator Service
  • ==-
Dismissed
(exclusively hosted service)
Permalink CVE-2026-21536
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago
Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Affected products

Microsoft Devices Pricing Program
  • ==-
Dismissed
(exclusively hosted service)
Permalink CVE-2026-26122
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 1 week ago
Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Microsoft ACI Confidential Containers Information Disclosure Vulnerability

Affected products

Microsoft ACI Confidential Containers
  • ==-
Permalink CVE-2025-47379
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 1 month, 1 week ago by @Erethon Activity log
  • Created automatic suggestion
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
Use After Free in Automotive Audio

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

Affected products

Snapdragon
  • ==WCD9335
  • ==QCA6564AU
  • ==C-V2X 9150
  • ==Snapdragon 690 5G Mobile Platform
  • ==WCN6755
  • ==Snapdragon Auto 5G Modem-RF
  • ==SM6225P
  • ==Snapdragon 888+ 5G Mobile Platform
  • ==SA6155
  • ==WCD9371
  • ==QCN6274
  • ==QCA6391
  • ==G1 Gen 1
  • ==SM8550P
  • ==Qualcomm 215 Mobile Platform
  • ==Snapdragon X55 5G Modem-RF System
  • ==LeMans_AU_LGIT
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCA6574A
  • ==SA4155P
  • ==QRB5165N
  • ==SA8145P
  • ==WCD9380
  • ==Robotics RB5 Platform
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SM7550P
  • ==WCN3910
  • ==QCM6490
  • ==FastConnect 6800
  • ==QCS4290
  • ==SA9000P
  • ==Snapdragon X12 LTE Modem
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==WSA8810
  • ==QCA6698AU
  • ==AR8031
  • ==QCC710
  • ==QCA6688AQ
  • ==WCN3660B
  • ==QCA6174A
  • ==SA6155P
  • ==WSA8832
  • ==SM7675P
  • ==SA6145P
  • ==WSA8835
  • ==QCM2290
  • ==QCS2290
  • ==SW5100
  • ==Snapdragon 870 5G Mobile Platform
  • ==WSA8815
  • ==QCA6574
  • ==QCA6564A
  • ==QEP8111
  • ==WCD9326
  • ==Flight RB5 5G Platform
  • ==MDM9250
  • ==Snapdragon 662 Mobile Platform
  • ==WCD9370
  • ==Snapdragon X35 5G Modem-RF System
  • ==SA7775P
  • ==WCN3990
  • ==QCN9011
  • ==SA4150P
  • ==WCN6450
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QCA6595AU
  • ==QCA6584AU
  • ==WCD9390
  • ==FWA Gen 3 Ultra Platform
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==SM6650P
  • ==SA8150P
  • ==SA8620P
  • ==WCD9378
  • ==WSA8845
  • ==Snapdragon XR2 5G Platform
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==Snapdragon X53 5G Modem-RF System
  • ==SA8155
  • ==Smart Audio 400 Platform
  • ==Snapdragon 680 4G Mobile Platform
  • ==Snapdragon 865 5G Mobile Platform
  • ==Snapdragon 782G Mobile Platform
  • ==QCM4325
  • ==FastConnect 6200
  • ==QRB5165M
  • ==SM8635P
  • ==Snapdragon 460 Mobile Platform
  • ==SD662
  • ==SnapdragonAuto 4GModem
  • ==Snapdragon X32 5G Modem-RF System
  • ==SA8195P
  • ==QFW7124
  • ==5G Fixed Wireless Access Platform
  • ==QCA6574AU
  • ==SA8295P
  • ==SW5100P
  • ==Milos
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==WCN3615
  • ==WCD9360
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==SA8770P
  • ==Snapdragon 695 5G Mobile Platform
  • ==WSA8830
  • ==WCN6650
  • ==WCN3680B
  • ==WSA8845H
  • ==Robotics RB2 Platform
  • ==QCA6564
  • ==QCA9377
  • ==QCA2066
  • ==SRV1M
  • ==QCA9367
  • ==LeMansAU
  • ==QCA6595
  • ==Snapdragon 660 Mobile Platform
  • ==QCM5430
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==Snapdragon 778G 5G Mobile Platform
  • ==QCA6797AQ
  • ==Snapdragon 480 5G Mobile Platform
  • ==QCA6696
  • ==AR8035
  • ==Snapdragon 888 5G Mobile Platform
  • ==SM8635
  • ==WCD9341
  • ==SA7255P
  • ==Snapdragon X75 5G Modem-RF System
  • ==WCD9385
  • ==WCN3950
  • ==QCA8337
  • ==SM7635P
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==FastConnect 6900
  • ==QCA8695AU
  • ==SA8155P
  • ==SD865 5G
  • ==QCA8081
  • ==Snapdragon 778G+ 5G Mobile Platform
  • ==WSA8840
  • ==QCN6224
  • ==QFW7114
  • ==FastConnect 6700
  • ==QCM6125
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==QAMSRV1M
  • ==SDA660
  • ==SM7325P
  • ==MDM9628
  • ==QAM8295P
  • ==SM8650Q
  • ==CSRA6620
  • ==SA2150P
  • ==QCN9012
  • ==FastConnect 7800
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WCN3988
  • ==WCN3980
  • ==SA6150P
  • ==QCS8550
  • ==SM7675
  • ==SRV1H
  • ==WCD9340
  • ==QCA6678AQ
  • ==WCD9395
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==QCA6698AQ
  • ==CSRA6640
  • ==QAM8255P
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==SA8255P
  • ==SM7550
  • ==WCD9375
  • ==QAMSRV1H
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==Snapdragon X72 5G Modem-RF System

Matching in nixpkgs

Testing suggestion edit
Testing round #2
Test round #3
Dismissed
(exclusively hosted service)
Permalink CVE-2026-26365
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @ADMIN Activity log
  • Created automatic suggestion
  • @ADMIN dismissed
Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles …

Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles processing of custom hop-by-hop HTTP headers, where an incoming request containing the header "Connection: Transfer-Encoding" could result in a forward request with invalid message framing, depending on the Akamai processing path. This could result in the origin server parsing the request body incorrectly, leading to HTTP request smuggling.

Affected products

Ghost
  • <2026-02-06

Matching in nixpkgs

pkgs.ghostie

Github notifications in your terminal

pkgs.ghostty

Fast, native, feature-rich terminal emulator pushing modern features

pkgs.ghostunnel

TLS proxy with mutual authentication support for securing non-TLS backend applications

pkgs.ghostty-bin

Fast, native, feature-rich terminal emulator pushing modern features

Package maintainers

Dismissed
(exclusively hosted service)
Permalink CVE-2025-54914
10.0 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 1 week ago by @ADMIN Activity log
  • Created automatic suggestion
  • @ADMIN dismissed
Azure Networking Elevation of Privilege Vulnerability

Azure Networking Elevation of Privilege Vulnerability

Affected products

Networking
  • ==-
  • ==N/A

Matching in nixpkgs

Package maintainers

Permalink CVE-2026-2968
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 1 month, 2 weeks ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk ignored package mongoose
  • @fricklerhandwerk dismissed
Cesanta Mongoose Poly1305 Authentication Tag tls_chacha20.c mg_chacha20_poly1305_decrypt signature verification

A vulnerability was detected in Cesanta Mongoose up to 7.20. This impacts the function mg_chacha20_poly1305_decrypt of the file /src/tls_chacha20.c of the component Poly1305 Authentication Tag Handler. The manipulation results in improper verification of cryptographic signature. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is said to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.2
  • ==7.20
  • ==7.11
  • ==7.4
  • ==7.8
  • ==7.14
  • ==7.0
  • ==7.9
  • ==7.17
  • ==7.1
  • ==7.7
  • ==7.5
  • ==7.12
  • ==7.3
  • ==7.18
  • ==7.13
  • ==7.15
  • ==7.16
  • ==7.6
  • ==7.10
  • ==7.19
Ignored packages (1)

pkgs.mongoose

Graph Coarsening and Partitioning Library

Not in Nixpkgs (the one in Nixpkgs is a different one)
updated 2 months, 2 weeks ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk ignored
    2 packages
    • terraform-providers.icinga_icinga2
    • terraform-providers.icinga2
  • @fricklerhandwerk dismissed
Icinga has insecure permission of %ProgramData%\icinga2\var on Windows

Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%\icinga2\var` folder on Windows. This resulted in the its contents - including the private key of the user and synced configuration - being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:\ProgramData\icinga2\var` (and `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.

Affected products

icinga2
  • ==>= 2.15.0, < 2.15.2
  • ==>= 2.14.0, < 2.14.8
  • ==>= 2.3.0, < 2.13.14

Matching in nixpkgs

Ignored packages (2)

Package maintainers

sdf
updated 2 months, 3 weeks ago by @fricklerhandwerk Activity log
  • Created automatic suggestion
  • @fricklerhandwerk ignored
    3 packages
    • python313Packages.moonraker-api
    • python312Packages.moonraker-api
    • home-assistant-custom-components.moonraker
  • @fricklerhandwerk dismissed
Moonraker with LDAP Enabled Allows Malicious Search Filter Injection

Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.

Affected products

moonraker
  • ==< 0.10.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

asd