Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-27600
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 1 month, 3 weeks ago Activity log
  • Created suggestion
HomeBox affected by Blind SSRF

HomeBox is a home inventory and organization system. Prior to 0.24.0-rc.1, the notifier functionality allows authenticated users to specify arbitrary URLs to which the application sends HTTP POST requests. No validation or restriction is applied to the supplied host, IP address, or port. Although the application does not return the response body from the target service, its UI behavior differs depending on the network state of the destination. This creates a behavioral side-channel that enables internal service enumeration. This vulnerability is fixed in 0.24.0-rc.1.

Affected products

homebox
  • ==< 0.24.0-rc.1

Matching in nixpkgs

pkgs.homebox

Inventory and organization system built for the Home User

Package maintainers

created 1 month, 3 weeks ago Activity log
  • Created suggestion
Application User custom defined accounts are not properly password protected in Brocade ASCG 3.4.0

Authentication bypass in Brocade ASCG 3.4.0 Could allow an unauthorized user to perform ASCG operations related to Brocade Support Link(BSL) and streaming configuration. and could even disable the ASCG application or disable use of BSL data collection on Brocade switches within the fabric.

Affected products

ASCG
  • ==3.4.0

Matching in nixpkgs

Permalink CVE-2026-25906
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 3 weeks ago Activity log
  • Created suggestion
Dell Optimizer, versions prior to 6.3.1, contain an Improper Link …

Dell Optimizer, versions prior to 6.3.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Affected products

Optimizer
  • <6.3.1.0

Matching in nixpkgs

pkgs.pngoptimizer

PNG optimizer and converter

  • nixos-unstable 2.7
    • nixpkgs-unstable 2.7
    • nixos-unstable-small 2.7
  • nixos-25.11 2.7
    • nixos-25.11-small 2.7
    • nixpkgs-25.11-darwin 2.7

pkgs.meshoptimizer

Mesh optimization library that makes meshes smaller and faster to render

  • nixos-unstable 1.0.1
    • nixpkgs-unstable 1.0.1
    • nixos-unstable-small 1.0.1
  • nixos-25.11 0.25
    • nixos-25.11-small 0.25
    • nixpkgs-25.11-darwin 0.25

Package maintainers

created 1 month, 3 weeks ago Activity log
  • Created suggestion
Improper access control vulnerability has been discovered in OpenText™ Filr.

Missing Authorization vulnerability in OpenText™ Filr allows Authentication Bypass. The vulnerability could allow unauthenticated users to get XSRF token and do RPC with carefully crafted programs. This issue affects Filr: through 25.1.2.

Affected products

Filr
  • =<25.1.2

Matching in nixpkgs

Package maintainers

created 1 month, 3 weeks ago Activity log
  • Created suggestion
Dify - Stored XSS in chat

Dify is an open-source LLM app development platform. Prior to 1.11.2, Dify is vulnerable to a stored XSS issue when rendering Mermaid diagrams within chats. This occurs because Dify’s default Mermaid configuration uses securityLevel: loose, which allows potentially unsafe content to execute. This vulnerability is fixed in 1.11.2.

Affected products

dify
  • ==< 1.11.2

Matching in nixpkgs

pkgs.hiddify-app

Multi-platform auto-proxy client, supporting Sing-box, X-ray, TUIC, Hysteria, Reality, Trojan, SSH etc

Package maintainers

created 1 month, 3 weeks ago Activity log
  • Created suggestion
OpenEXR CompositeDeepScanLine integer-overflow leads to heap OOB write

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector<unsigned int> total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32. overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.

Affected products

openexr
  • ==>= 3.4.0, < 3.4.6
  • ==>= 3.3.0, < 3.3.8
  • ==>= 2.3.0, < 3.2.6

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Package maintainers

Permalink CVE-2026-21385
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 3 weeks ago Activity log
  • Created suggestion
Integer Overflow or Wraparound in Graphics

Memory corruption while using alignments for memory allocation.

Affected products

Snapdragon
  • ==WSA8840
  • ==SM8635P
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==WCN3620
  • ==QCA9377
  • ==SXR2230P
  • ==QCA8695AU
  • ==QCA9367
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==SD626
  • ==Qualcomm 215 Mobile Platform
  • ==WSA8845H
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==WSA8830
  • ==AR8031
  • ==SM7550P
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==QCS4290
  • ==AR8035
  • ==QCN9024
  • ==WCD9370
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==SRV1H
  • ==Snapdragon X55 5G Modem-RF System
  • ==WCN7880
  • ==LeMans_AU_LGIT
  • ==SA6155P
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==FastConnect 6900
  • ==QCA6564A
  • ==SAR1165P
  • ==QCA6564AU
  • ==SA6155
  • ==IQ9 Series Platform
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==WCD9360
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCD9380
  • ==QAM8255P
  • ==QRB5165N
  • ==SW6100P
  • ==QXM1083
  • ==WCN3910
  • ==Snapdragon 888 5G Mobile Platform
  • ==SA6150P
  • ==SA8145P
  • ==Snapdragon X5 LTE Modem
  • ==QPA1086BD
  • ==WCN3615
  • ==CSRA6640
  • ==Snapdragon 429 Mobile Platform
  • ==Snapdragon 820 Automotive Platform
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==WCD9390
  • ==QCA6595AU
  • ==SDM429W
  • ==SA6145P
  • ==Snapdragon 460 Mobile Platform
  • ==QCA6595
  • ==SA7775P
  • ==SAR1250P
  • ==Monaco_IOT
  • ==Snapdragon 695 5G Mobile Platform
  • ==Vision Intelligence 200 Platform
  • ==Snapdragon 778G+ 5G Mobile Platform
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==FastConnect 7800
  • ==QCM6490
  • ==FastConnect 6200
  • ==Snapdragon Auto 5G Modem-RF
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==FastConnect 6700
  • ==QLN1083BD
  • ==SA8195P
  • ==SW5100
  • ==SDA660
  • ==QLN1086BD
  • ==Snapdragon 820Am
  • ==QCA6584AU
  • ==Vision Intelligence 100 Platform
  • ==WSA8835
  • ==SM7325P
  • ==Snapdragon 8 Elite Gen 5
  • ==WCD9330
  • ==SM8635
  • ==SM8750P
  • ==SXR2330P
  • ==Snapdragon XR2 5G Platform
  • ==G1 Gen 1
  • ==WCD9378
  • ==Smart Display 200 Platform
  • ==SA8150P
  • ==WCD9341
  • ==SM8550P
  • ==SA8155
  • ==SXR2250P
  • ==SC8380XP
  • ==Themisto
  • ==WCD9326
  • ==WCD9371
  • ==WCN7860
  • ==IQ8 Series Platform
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==Snapdragon 625 Mobile Platform
  • ==SD865 5G
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCN3950
  • ==CSRA6620
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==G2 Gen 1
  • ==Snapdragon 685 4G Mobile Platform
  • ==WCN3680B
  • ==Snapdragon 480 5G Mobile Platform
  • ==SRV1M
  • ==MDM9250
  • ==SD662
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==QCA6174A
  • ==Flight RB5 5G Platform
  • ==SD 8 Gen1 5G
  • ==Snapdragon 626 Mobile Platform
  • ==QCA8081
  • ==SA8620P
  • ==Snapdragon 660 Mobile Platform
  • ==QPA1083BD
  • ==QCM5430
  • ==QXM1086
  • ==QXM1096
  • ==SM6650P
  • ==SA8155P
  • ==Snapdragon X53 5G Modem-RF System
  • ==SAR2230P
  • ==QCM6125
  • ==QCA6797AQ
  • ==QCM4490
  • ==Milos
  • ==QCA6574AU
  • ==QCS8550
  • ==QCA6698AU
  • ==WSA8815
  • ==Netrani
  • ==QCN6024
  • ==SA8255P
  • ==SM7550
  • ==SXR2350P
  • ==5G Fixed Wireless Access Platform
  • ==QAMSRV1M
  • ==QCA6688AQ
  • ==QCM4325
  • ==C-V2X 9150
  • ==SM8475P
  • ==QXM1095
  • ==SA4155P
  • ==Orne
  • ==Snapdragon X65 5G Modem-RF System
  • ==WCN6650
  • ==Snapdragon 778G 5G Mobile Platform
  • ==WCN3660B
  • ==Smart Audio 400 Platform
  • ==Robotics RB2 Platform
  • ==QCM2290
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==SA9000P
  • ==WCD9385
  • ==SM7675P
  • ==QMP1000
  • ==WCD9375
  • ==Snapdragon 690 5G Mobile Platform
  • ==LeMansAU
  • ==QCA6698AQ
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==WCN6450
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==WCD9335
  • ==Snapdragon 782G Mobile Platform
  • ==WCN7861
  • ==SDX61
  • ==APQ8098
  • ==QCA6696
  • ==SA4150P
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==MDM9628
  • ==QCN9012
  • ==SW6100
  • ==WCN7881
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==QXM1093
  • ==Snapdragon 888+ 5G Mobile Platform
  • ==SM7435
  • ==QAMSRV1H
  • ==Snapdragon 8 Elite
  • ==SA7255P
  • ==QCA6678AQ
  • ==SA8770P
  • ==WSA8810
  • ==Robotics RB5 Platform
  • ==QCA6574A
  • ==SM7675
  • ==SM7635P
  • ==QRB5165M
  • ==QCA2066
  • ==Snapdragon 865+ 5G Mobile Platform
  • ==WCN3988
  • ==Palawan25
  • ==QAM8295P
  • ==Snapdragon X12 LTE Modem
  • ==SW5100P
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==WSA8845
  • ==FSM100 Platform
  • ==QCN9011
  • ==SM8650Q
  • ==SAR2130P
  • ==WCD9395
  • ==QCA8337
  • ==QCS2290
  • ==WCN3990
  • ==QCA6574
  • ==Pandeiro
  • ==QCA6391
  • ==Snapdragon 870 5G Mobile Platform
  • ==WCN6755
  • ==Snapdragon 662 Mobile Platform
  • ==QCS4490
  • ==WSA8832
  • ==QXM1094
  • ==SA8295P
  • ==IQ6 Series Platform
  • ==Snapdragon 865 5G Mobile Platform
  • ==FastConnect 6800
  • ==WCN3980
  • ==Vision Intelligence 400 Platform
  • ==SM6225P

Matching in nixpkgs

created 1 month, 3 weeks ago Activity log
  • Created suggestion
AFFiNE: Open Redirect via Regex Bypass in redirect-proxy

AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.26.0, there is an Open Redirect vulnerability located at the /redirect-proxy endpoint. The flaw exists in the domain validation logic, where an improperly anchored Regular Expression allows an attacker to bypass the whitelist by using malicious domains that end with a trusted string. This issue has been patched in version 0.26.0.

Affected products

AFFiNE
  • ==< 0.26.0

Matching in nixpkgs

pkgs.affine

Workspace with fully merged docs, whiteboards and databases

pkgs.python313Packages.affinegap

Cython implementation of the affine gap string distance

  • nixos-unstable 2
    • nixpkgs-unstable 2
    • nixos-unstable-small 2
  • nixos-25.11 1.12
    • nixos-25.11-small 1.12
    • nixpkgs-25.11-darwin 1.12

Package maintainers

Permalink CVE-2025-47377
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 month, 3 weeks ago Activity log
  • Created suggestion
Use After Free in Automotive Audio

Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.

Affected products

Snapdragon
  • ==QCA8337
  • ==QCM4325
  • ==WCD9340
  • ==SXR2350P
  • ==WSA8845H
  • ==AR8035
  • ==QCA6696
  • ==QCN6274
  • ==WCD9370
  • ==FastConnect 6900
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==QCS4290
  • ==FastConnect 6200
  • ==Snapdragon X35 5G Modem-RF System
  • ==Flight RB5 5G Platform
  • ==SM7675
  • ==QCA6595AU
  • ==QCA6574A
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==SW5100P
  • ==LeMansAU
  • ==WCD9371
  • ==Snapdragon X75 5G Modem-RF System
  • ==SM7550
  • ==QCA6698AQ
  • ==QCA9367
  • ==QCA6584AU
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==SA8255P
  • ==Snapdragon 460 Mobile Platform
  • ==SM7635P
  • ==SM8550P
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==WSA8810
  • ==Snapdragon X32 5G Modem-RF System
  • ==QCA9377
  • ==WSA8832
  • ==SM7675P
  • ==QCA6174A
  • ==FastConnect 7800
  • ==LeMans_AU_LGIT
  • ==QCS2290
  • ==QFW7114
  • ==SRV1H
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==Snapdragon 685 4G Mobile Platform
  • ==QCC710
  • ==SD662
  • ==SM7550P
  • ==SM8635
  • ==WCN3980
  • ==Snapdragon 480 5G Mobile Platform
  • ==QCA6688AQ
  • ==SA9000P
  • ==SA7255P
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WCN6650
  • ==Snapdragon Auto 5G Modem-RF Gen 2
  • ==SA8155P
  • ==QAM8295P
  • ==QCA6698AU
  • ==G1 Gen 1
  • ==QCN6224
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==QCN9012
  • ==SM8650Q
  • ==WCD9375
  • ==QFW7124
  • ==QCS8550
  • ==WCD9378
  • ==WCN3988
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==QCA6797AQ
  • ==SA8620P
  • ==SM8635P
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==QCN9011
  • ==QAMSRV1H
  • ==SM6650P
  • ==SM6225P
  • ==WCD9385
  • ==WSA8840
  • ==QCM6125
  • ==WCN3950
  • ==SA8770P
  • ==WCD9390
  • ==FWA Gen 3 Ultra Platform
  • ==WSA8845
  • ==QCA6595
  • ==SW5100
  • ==WSA8815
  • ==Robotics RB5 Platform
  • ==SA8195P
  • ==SA6155P
  • ==SXR2330P
  • ==SA7775P
  • ==QCM2290
  • ==WCD9380
  • ==QAM8255P
  • ==SRV1M
  • ==Snapdragon 662 Mobile Platform
  • ==SA8295P
  • ==QCA6391
  • ==QCA6574AU
  • ==WCN3910
  • ==WCN6755
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCA6678AQ
  • ==QRB5165N
  • ==Snapdragon 680 4G Mobile Platform
  • ==WSA8835
  • ==QCA6574
  • ==QCA8695AU
  • ==QEP8111
  • ==WSA8830
  • ==QCA8081
  • ==WCD9395
  • ==Snapdragon 695 5G Mobile Platform
  • ==QAMSRV1M
  • ==Milos
  • ==Snapdragon X72 5G Modem-RF System
  • ==WCN6450

Matching in nixpkgs

created 1 month, 3 weeks ago Activity log
  • Created suggestion
Exiv2: Integer Underflow in LoaderNative::getData() Causes Heap Buffer Overflow

Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2 to crash. This issue has been patched in version 0.28.8.

Affected products

exiv2
  • ==< 0.28.8

Matching in nixpkgs

pkgs.exiv2

Library and command-line utility to manage image metadata

pkgs.gexiv2

GObject wrapper around the Exiv2 photo metadata library