Nixpkgs Security Tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to remove a suggestion from the queue.

created 5 hours ago
Improper Release of Memory Before Removing Last Reference in Graphics

Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.

Affected products

Snapdragon
  • ==QCM8838
  • ==QCA6688AQ
  • ==Robotics RB5 Platform
  • ==SDR753
  • ==SD 8 Gen1 5G
  • ==QXM1094
  • ==WCD9380
  • ==SM8550P
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==SRV1L
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==SSG2115P
  • ==WCN7881
  • ==LeMans_AU_LGIT
  • ==WCD9378
  • ==SW6100
  • ==WCN3988
  • ==SD662
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM8635P
  • ==Milos
  • ==SXR2350P
  • ==G2 Gen 1
  • ==QXM1093
  • ==WSA8845H
  • ==SA7775P
  • ==SRV1M
  • ==WCD9395
  • ==Pandeiro
  • ==WCD9370
  • ==QCA6698AU
  • ==SA8295P
  • ==SW5100P
  • ==QCA6595
  • ==QCA6698AQ
  • ==Snapdragon 662 Mobile Platform
  • ==QCA6574
  • ==QCA8695AU
  • ==Snapdragon 460 Mobile Platform
  • ==QMB715
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==QPA1086BD
  • ==QCN9011
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==WCN3990
  • ==SXR2330P
  • ==QAM8295P
  • ==SA8195P
  • ==QAM8397P
  • ==QCM8550
  • ==WCN3950
  • ==QCS2290
  • ==QXM1096
  • ==QMB415
  • ==Snapdragon 8 Elite
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCN6450
  • ==WCN3910
  • ==SD865 5G
  • ==WCD9335
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==WCN7861
  • ==SA9000P
  • ==WSA8840
  • ==Themisto
  • ==IQ9 Series Platform
  • ==QCA6574A
  • ==QCM4325
  • ==Flight RB5 5G Platform
  • ==SA8620P
  • ==WCD9385
  • ==SSG2125P
  • ==WSA8810
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==SA8770P
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WSA8830
  • ==QAM8620P
  • ==QMP1000
  • ==QAMSRV1H
  • ==QCM5430
  • ==SM8650Q
  • ==SA8255P
  • ==SAR2130P
  • ==SM8635
  • ==QAM8797P
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==IQ8 Series Platform
  • ==QCM4490
  • ==QCM6490
  • ==SM6650P
  • ==SM7635P
  • ==Snapdragon AR1 Gen 1 Platform
  • ==TalynPlus
  • ==Milos_IOT
  • ==Snapdragon XR2+ Gen 1 Platform
  • ==QAM8255P
  • ==SM7675
  • ==QCS4490
  • ==IQ6 Series Platform
  • ==Kalpeni
  • ==QCA6595AU
  • ==Vision Intelligence 400 Platform
  • ==SXR2230P
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==SXR2250P
  • ==QCA6696
  • ==Snapdragon 8 Elite Gen 5
  • ==WSA8835
  • ==WCN7880
  • ==WCN6755
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==WCN7860
  • ==QCN9274
  • ==IQ10 Series
  • ==SAR2230P
  • ==WSA8845
  • ==WSA8832
  • ==QCA6678AQ
  • ==SXR1230P
  • ==FastConnect 6900
  • ==WCD9375
  • ==WCD9390
  • ==QAMSRV1M
  • ==QLN1083BD
  • ==SRV1H
  • ==SM6225P
  • ==FastConnect 6700
  • ==LeMansAU
  • ==FastConnect 7800
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==QCS6690
  • ==SM7675P
  • ==QCS8550
  • ==Snapdragon 695 5G Mobile Platform
  • ==QCA6574AU
  • ==Monaco_IOT
  • ==SA8155P
  • ==Snapdragon XR2 5G Platform
  • ==G1 Gen 1
  • ==WCD9341
  • ==QCM6125
  • ==QRB5165N
  • ==SW6100P
  • ==WCN6650
  • ==Orne
  • ==SM8750P
  • ==QCS4290
  • ==WCN3980
  • ==QLN1086BD
  • ==QCM2290
  • ==SW5100
  • ==SA6155P
  • ==Snapdragon 7 Gen 4 Mobile Platform
  • ==QCN9012
  • ==Palawan25
  • ==Snapdragon 685 4G Mobile Platform
  • ==QXM1095
  • ==FastConnect 6200
  • ==WSA8815
  • ==Snapdragon 480 5G Mobile Platform
  • ==QCA6391
  • ==SA7255P
  • ==SAR1250P
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==QCA6797AQ
  • ==QPA1083BD

Matching in nixpkgs

pkgs.snapdragon-profiler

Profiler for Android devices running Snapdragon chips

created 5 hours ago
Libsoup: soupserver: denial of service via http request smuggling

A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.

Affected products

libsoup
libsoup3

Matching in nixpkgs

pkgs.tests.pkg-config.defaultPkgConfigPackages."libsoup-gnome-2.4"

Test whether libsoup-2.74.3 exposes pkg-config modules libsoup-gnome-2.4

  • nixos-unstable -
    • nixpkgs-unstable
    • nixos-unstable-small
  • nixos-25.11 -
    • nixpkgs-25.11-darwin
  • nixos-25.05 -
    • nixos-25.05-small

Package maintainers

created 5 hours ago
mPDF 7.0 - Local File Inclusion

mPDF 7.0 contains a local file inclusion vulnerability that allows attackers to read arbitrary system files by manipulating annotation file parameters. Attackers can generate URL-encoded or base64 payloads to include local files through crafted annotation content with file path specifications.

Affected products

mPDF
  • ==7.0

Matching in nixpkgs

Package maintainers

created 5 hours ago
TeamSpeak 3.5.6 - Insecure File Permissions

TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.

Affected products

TeamSpeak
  • ==3.5.6

Matching in nixpkgs

pkgs.teamspeak3

TeamSpeak voice communication tool

pkgs.teamspeak_client

TeamSpeak voice communication tool

Package maintainers

created 5 hours ago
Autoblocks from global account suppressions are publicly visible

Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/specials/pagers/BlockListPager.Php, includes/api/ApiQueryBlocks.Php. This issue affects MediaWiki: from >= 1.42.0 before 1.39.13, 1.42.7 1.43.2, 1.44.0.

Affected products

MediaWiki
  • <1.39.13, 1.42.7 1.43.2, 1.44.0

Matching in nixpkgs

Package maintainers

created 5 hours ago
MediaWiki should not consider autocreation as login for the purposes of security reauthentication

Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/auth/AuthManager.Php. This issue affects MediaWiki: from * before 1.39.13, 1.42.7, 1.43.2, 1.44.0.

Affected products

MediaWiki
  • <1.39.13, 1.42.7, 1.43.2, 1.44.0

Matching in nixpkgs

Package maintainers

created 5 hours ago
With MultiBlocks enabled and a user who is suppressed via a MultiBlock, a user without 'hideuser' can see the hidden username in the BlockList

Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program files includes/specials/pagers/BlockListPager.Php. This issue affects MediaWiki: >= 1.42.0.

Affected products

MediaWiki
  • ==>= 1.42.0

Matching in nixpkgs

Package maintainers

created 5 hours ago
OpenList affected by Path Traversal in file copy and remove handlers

OpenList Frontend is a UI component for OpenList. Prior to 4.1.10, the application contains path traversal vulnerability in multiple file operation handlers in server/handles/fsmanage.go. Filename components in req.Names are directly concatenated with validated directories using stdpath.Join. This allows ".." sequences to bypass path restrictions, enabling users to access other users' files within the same storage mount and perform unauthorized actions such as deletion, renaming, or copying of files. An authenticated attacker can bypass directory-level authorisation by injecting traversal sequences into filename components, enabling unauthorised file removal and copying across user boundaries within the same storage mount. This vulnerability is fixed in 4.1.10.

Affected products

OpenList
  • ==< 4.1.10

Matching in nixpkgs

Package maintainers

created 5 hours ago
Org.keycloak.services.resources.admin: keycloak: limited administrator can retrieve sensitive user attributes via admin api

A flaw was found in Keycloak Admin API. This vulnerability allows an administrator with limited privileges to retrieve sensitive custom attributes via the /unmanagedAttributes endpoint, bypassing User Profile visibility settings.

Affected products

keycloak

Matching in nixpkgs

pkgs.keycloak

Identity and access management for modern applications and services

pkgs.terraform-providers.keycloak

None

pkgs.python312Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python313Packages.python-keycloak

Provides access to the Keycloak API

pkgs.python314Packages.python-keycloak

Provides access to the Keycloak API

pkgs.terraform-providers.keycloak_keycloak

None

Package maintainers

created 5 hours ago
Use After Free in Graphics

Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.

Affected products

Snapdragon
  • ==QCA6688AQ
  • ==Robotics RB5 Platform
  • ==Netrani
  • ==SD 8 Gen1 5G
  • ==QCA2066
  • ==WCD9380
  • ==SM8550P
  • ==Snapdragon 8+ Gen 2 Mobile Platform
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==SSG2115P
  • ==WCN7881
  • ==LeMans_AU_LGIT
  • ==WCD9378
  • ==WCN3988
  • ==SM8475P
  • ==AR8031
  • ==SD662
  • ==Snapdragon 480+ 5G Mobile Platform
  • ==SM8635P
  • ==Milos
  • ==SXR2350P
  • ==G2 Gen 1
  • ==WSA8845H
  • ==SA7775P
  • ==SRV1M
  • ==WCD9395
  • ==WCD9370
  • ==QCA6698AU
  • ==SA8295P
  • ==SW5100P
  • ==QCA6595
  • ==QCA6698AQ
  • ==CSRA6640
  • ==Snapdragon 662 Mobile Platform
  • ==QCA6574
  • ==QCA8695AU
  • ==Snapdragon 460 Mobile Platform
  • ==Qualcomm Video Collaboration VC5 Platform
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCN9011
  • ==SM7435
  • ==WCN3990
  • ==SM7550
  • ==SXR2330P
  • ==QAM8295P
  • ==SA8195P
  • ==WCN3950
  • ==QCS2290
  • ==Snapdragon 8 Elite
  • ==Snapdragon 680 4G Mobile Platform
  • ==WCN3910
  • ==WCD9335
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==WCN7861
  • ==SA9000P
  • ==WSA8840
  • ==IQ9 Series Platform
  • ==QCA6574A
  • ==QCM4325
  • ==Flight RB5 5G Platform
  • ==SA8620P
  • ==WCD9385
  • ==SSG2125P
  • ==WSA8810
  • ==Snapdragon 8 Gen 1 Mobile Platform
  • ==QCS410
  • ==SA8770P
  • ==Snapdragon 4 Gen 1 Mobile Platform
  • ==WSA8830
  • ==QMP1000
  • ==QAMSRV1H
  • ==QCM5430
  • ==SM8650Q
  • ==SA8255P
  • ==SAR2130P
  • ==Smart Audio 400 Platform
  • ==SDA660
  • ==SM8635
  • ==Qualcomm Video Collaboration VC1 Platform
  • ==IQ8 Series Platform
  • ==QCM4490
  • ==QCM6490
  • ==SM6650P
  • ==SM7635P
  • ==Snapdragon 660 Mobile Platform
  • ==Snapdragon AR1 Gen 1 Platform
  • ==QAM8255P
  • ==SM7675
  • ==QCS4490
  • ==Snapdragon 7+ Gen 2 Mobile Platform
  • ==IQ6 Series Platform
  • ==QCA6595AU
  • ==SXR2230P
  • ==Snapdragon W5+ Gen 1 Wearable Platform
  • ==SXR2250P
  • ==QCA6696
  • ==WSA8835
  • ==WCN7880
  • ==WCN6755
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==Snapdragon 8+ Gen 1 Mobile Platform
  • ==WCN7860
  • ==WSA8845
  • ==WSA8832
  • ==QCA6678AQ
  • ==SXR1230P
  • ==CSRA6620
  • ==FastConnect 6900
  • ==WCD9375
  • ==WCD9390
  • ==QAMSRV1M
  • ==SRV1H
  • ==SM6225P
  • ==FastConnect 6700
  • ==LeMansAU
  • ==FastConnect 7800
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==Snapdragon 7 Gen 1 Mobile Platform
  • ==Snapdragon 8 Gen 2 Mobile Platform
  • ==SM7675P
  • ==QCS8550
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==Snapdragon 695 5G Mobile Platform
  • ==QCA6574AU
  • ==Monaco_IOT
  • ==SA8155P
  • ==G1 Gen 1
  • ==WCD9341
  • ==QCM6125
  • ==QRB5165N
  • ==WCD9371
  • ==SM7550P
  • ==WCN6650
  • ==Orne
  • ==SM8750P
  • ==QCS4290
  • ==WCN3980
  • ==QCM2290
  • ==SW5100
  • ==SA6155P
  • ==QCN9012
  • ==Palawan25
  • ==Snapdragon 685 4G Mobile Platform
  • ==Robotics RB2 Platform
  • ==FastConnect 6200
  • ==WSA8815
  • ==Snapdragon 480 5G Mobile Platform
  • ==QCA6391
  • ==SA7255P
  • ==Snapdragon 4 Gen 2 Mobile Platform
  • ==QCA6797AQ

Matching in nixpkgs

pkgs.snapdragon-profiler

Profiler for Android devices running Snapdragon chips