Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2025-15571
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 1 week ago Activity log
  • Created suggestion
ckolivas lrzip stream.c ucompthread null pointer dereference

A security vulnerability has been detected in ckolivas lrzip up to 0.651. This vulnerability affects the function ucompthread of the file stream.c. Such manipulation leads to null pointer dereference. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

lrzip
  • ==0.651

Matching in nixpkgs

pkgs.lrzip

CK LRZIP compression program (LZMA + RZIP)

Permalink CVE-2025-15572
3.3 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 1 week ago Activity log
  • Created suggestion
wasm3 NewCodePage memory leak

A vulnerability has been found in wasm3 up to 0.5.0. The affected element is the function NewCodePage. The manipulation leads to memory leak. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Unfortunately, the project has no active maintainer at the moment.

Affected products

wasm3
  • ==0.5.0
  • ==0.3
  • ==0.1
  • ==0.4
  • ==0.2

Matching in nixpkgs

pkgs.wasm3

Fastest WebAssembly interpreter, and the most universal runtime

Package maintainers

Permalink CVE-2025-24477
4.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 1 week ago Activity log
  • Created suggestion
A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through …

A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2.4 through 7.2.11 allows an attacker to escalate its privileges via a specially crafted CLI command

Affected products

FortiOS
  • =<7.4.7
  • =<7.6.2
  • =<7.2.11
  • =<7.2.12

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-27572
4.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 1 week ago Activity log
  • Created suggestion
Exposure of sensitive information during transient execution for some TDX …

Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Affected products

TDX
  • ==See references

Matching in nixpkgs

pkgs.libkrun-tdx

Dynamic library providing Virtualization-based process isolation capabilities

Package maintainers

Permalink CVE-2025-30033
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 1 week ago Activity log
  • Created suggestion
The affected setup component is vulnerable to DLL hijacking. This …

The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component.

Affected products

SITRANS
  • *
SINEC NMS
  • <V4.0
CEMAT V10.0
  • *
OpenPCS 7 V9.1
  • *
SIMATIC S7-PCT
  • *
  • <V3.5 SP4 Update 1
SIMATIC Target
  • *
OpenPCS 7 V10.0
  • *
SIMATIC D7-SYS
  • *
SIMATIC PDM V9.2
  • *
SIMATIC PDM V9.3
  • *
  • <V9.3 SP1 Upd2
SIMATIC ODK 1500S
  • *
TIA Administrator
  • <V3.0.6
SIMATIC BATCH V9.1
  • *
SIMATIC Logon V1.6
  • *
SIMATIC Logon V2.0
  • *
  • <V2.0 Upd3
SIMATIC PCS 7 V9.1
  • *
  • <V9.1 SP1 UC08
SIMATIC WinCC V7.5
  • *
SIMATIC WinCC V8.0
  • *
SIMATIC WinCC V8.1
  • <V8.1 Update 3
SIMIT Rapid Tester
  • *
TIA Project-Server
  • *
  • <V2.2
SIMATIC BATCH V10.0
  • *
SIMATIC PCS 7 V10.0
  • *
  • <V10.0 SP1 UC01
SIMATIC ProSave V17
  • *
  • <V17 Update 9
SIMATIC ProSave V18
  • *
SIMATIC ProSave V19
  • <V19 Update 4
SIMATIC ProSave V20
  • *
SIMATIC STEP 7 V5.7
  • *
SIMATIC PCS neo V5.0
  • *
SIMATIC PCS neo V6.0
  • <V6.0 SP1
Create MyConfig (CMC)
  • *
  • <V6.9
Modular PID CTRL Tool
  • *
SIMATIC S7-PLCSIM V17
  • *
SIMATIC S7-PLCSIM V18
  • *
SIMATIC S7-PLCSIM V19
  • *
SIMATIC S7-PLCSIM V20
  • <V20 Update 1
SIMATIC Safety Matrix
  • *
SIMATIC STEP 7 CFC V19
  • *
SIMATIC STEP 7 CFC V20
  • *
Standard PID CTRL Tool
  • *
TIA Project-Server V17
  • *
SIMATIC Automation Tool
  • *
SINAMICS Startdrive V17
  • *
SINAMICS Startdrive V18
  • *
SINAMICS Startdrive V19
  • *
SINAMICS Startdrive V20
  • *
WinCC Panel Image Setup
  • *
  • <V17 Update 9
FM Configuration Package
  • *
SIMATIC Energy Suite V17
  • *
SIMATIC Energy Suite V18
  • *
SIMATIC Energy Suite V19
  • *
  • <V19 Update 4
SIMATIC MTP CREATOR V3.x
  • *
SIMATIC MTP CREATOR V4.x
  • *
  • <V4.1.0.1
SIMATIC Management Agent
  • *
  • <V9.1 SP1 Upd8
SIMATIC MTP CREATOR V2.x
  • *
  • <V2.1
SIMATIC MTP CREATOR V5.x
  • *
  • <V5.0.0.1
SIMATIC PCS 7 TeleControl
  • *
SIMATIC S7 F Systems V6.3
  • *
SIMATIC S7 F Systems V6.4
  • *
SIMATIC WinCC TeleControl
  • *
SIMATIC WinCC flexible ES
  • *
SIMIT Simulation Platform
  • *
TIA Portal Test Suite V17
  • *
TIA Portal Test Suite V18
  • *
TIA Portal Test Suite V19
  • *
  • <V19 Update 4
TIA Portal Test Suite V20
  • *
  • <V20 Update 3
SIMATIC Management Console
  • *
  • <V9.1 SP1 Upd8
SIMATIC PCS 7 PowerControl
  • *
SIMATIC PCS 7/OPEN OS V9.1
  • *
SIMATIC Route Control V9.1
  • *
SIMATIC S7-PLCSIM Advanced
  • <V7.0 Update 1
SIMATIC eaSie Core Package
  • *
TIA Portal Cloud Connector
  • *
  • <V2.3
SIMATIC MTP Integrator V1.x
  • *
SIMATIC MTP Integrator V2.x
  • *
SIMATIC NET PC Software V16
  • *
SIMATIC NET PC Software V17
  • *
SIMATIC NET PC Software V18
  • *
SIMATIC NET PC Software V19
  • *
SIMATIC NET PC Software V20
  • <V20.0 Update 1
SIMATIC Route Control V10.0
  • *
SINEMA Remote Connect Client
  • *
Energy Support Library (EnSL)
  • *
SIMATIC eaSie Document Skills
  • *
SIMATIC eaSie Workflow Skills
  • *
TeleControl Server Basic V3.1
  • <V3.1.2.2
SIMATIC PCS 7 MPC Configurator
  • *
SIMATIC Process Historian 2020
  • *
SIMATIC Process Historian 2022
  • *
SIMATIC Process Historian 2024
  • *
  • <V2024 SP1 Upd2
SIMATIC WinCC Runtime Advanced
  • *
  • <V17 Update 9
SIMATIC WinCC Unified Sequence
  • *
  • <V20
Automation License Manager V6.0
  • *
Automation License Manager V6.2
  • <V6.2 Upd3
SIMATIC PCS 7 Logic Matrix V9.1
  • *
  • <V9.1 Upd8
SIMATIC PCS 7 Basis Library V9.1
  • *
  • <V9.1 SP2 Upd8
SIMATIC PCS 7 Logic Matrix V10.0
  • *
SIMATIC PCS 7 Basis Library V10.0
  • *
  • <V10.0 SP1 Upd2
SIMATIC eaSie PCS 7 Skill Package
  • *
CP PtP Param configuring interface
  • *
SIMATIC WinCC Runtime Professional
  • *
  • <V21
SIMATIC Automation Tool SDK Windows
  • *
SIMATIC PCS 7 Basis Faceplates V9.1
  • *
  • <V9.1 SP2 Upd2
SIMATIC PCS 7 Industry Library V9.0
  • *
SIMATIC PCS 7 Industry Library V9.1
  • *
Siemens Network Planner (SINETPLAN)
  • *
SIMATIC PCS 7 Industry Library V10.0
  • *
SIMATIC PDM Maintenance Station V5.0
  • *
SIMATIC WinCC Unified PC Runtime V18
  • *
SIMATIC WinCC Unified PC Runtime V19
  • *
SIMATIC WinCC Unified PC Runtime V20
  • *
SIMATIC S7-1500 Software Controller V2
  • *
SIMATIC S7-1500 Software Controller V3
  • *
  • <V31.1.5
SIMATIC WinCC Runtime Professional V20
  • *
SIMATIC WinCC Unified Line Coordination
  • *
  • <V20
MultiFieldbus Configuration Tool (MFCT)
  • *
  • <V1.5.5.0
SIMATIC Control Function Library (CFL) V1.x
  • *
SIMATIC Control Function Library (CFL) V2.0
  • *
SIMATIC Control Function Library (CFL) V2.x
  • *
SIMATIC Control Function Library (CFL) V3.0
  • *
SIMATIC Control Function Library (CFL) V3.x
  • <V3.1.0.2
SIMATIC Control Function Library (CFL) V4.0
  • *
SIMATIC Control Function Library (CFL) V4.x
  • *
  • <V4.1
SIMATIC PCS 7 Advanced Process Library V9.1
  • *
  • <V9.1 SP2 Upd6
SIMATIC Process Function Library (PFL) V4.0
  • *
SIMATIC PCS 7 Advanced Process Graphics V9.1
  • *
SIMATIC PCS 7 Standard Chemical Library V9.1
  • *
SIMATIC Control Function Library (CFL) V1.0.0
  • *
SIMATIC PCS 7 Advanced Process Functions V2.1
  • *
SIMATIC PCS 7 Advanced Process Functions V2.2
  • *
SIMATIC PCS 7 Advanced Process Graphics V10.0
  • *
SIMATIC PCS 7 Standard Chemical Library V10.0
  • *
SIMATIC PCS 7 Advanced Process Faceplates V9.1
  • *
  • <V9.1 SP2 Upd4
SIMATIC S7-Fail-safe Configuration Tool (S7-FCT)
  • <V4.0.1
SIMATIC WinCC Visualization Architect (SiVArc) V17
  • *
  • <V17 Update 9
SIMATIC WinCC Visualization Architect (SiVArc) V18
  • *
SIMATIC WinCC Visualization Architect (SiVArc) V19
  • *
  • <V19 Update 4
SIMATIC WinCC Visualization Architect (SiVArc) V20
  • *
  • <V20 Update 3
Totally Integrated Automation Portal (TIA Portal) V17
  • <V17 Update 9
Totally Integrated Automation Portal (TIA Portal) V18
  • *
Totally Integrated Automation Portal (TIA Portal) V19
  • <V19 Update 4
Totally Integrated Automation Portal (TIA Portal) V20
  • <V20 Update 4
SIMATIC PCS 7 Advanced Process Library incl. Faceplates V10.0
  • *

Matching in nixpkgs

pkgs.psitransfer

Simple open source self-hosted file sharing solution

Package maintainers

Permalink CVE-2025-32007
4.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 1 week ago Activity log
  • Created suggestion
Out-of-bounds read for some TDX before version tdx module 1.5.24 …

Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allow an information disclosure. Authorized adversary with a privileged user combined with a low complexity attack may enable data exposure. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (none) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

Affected products

TDX
  • ==before version tdx module 1.5.24

Matching in nixpkgs

pkgs.libkrun-tdx

Dynamic library providing Virtualization-based process isolation capabilities

Package maintainers

Permalink CVE-2025-55018
5.2 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 months, 1 week ago Activity log
  • Created suggestion
An inconsistent interpretation of http requests ('http request smuggling') vulnerability …

An inconsistent interpretation of http requests ('http request smuggling') vulnerability in Fortinet FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4.3 through 6.4.16 may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a specially crafted header

Affected products

FortiOS
  • ==7.6.0
  • =<7.2.13
  • =<7.0.19
  • =<6.4.16
  • =<7.4.9

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-62439
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 months, 1 week ago Activity log
  • Created suggestion
An Improper Verification of Source of a Communication Channel vulnerability …

An Improper Verification of Source of a Communication Channel vulnerability [CWE-940] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2 all versions, FortiOS 7.0 all versions may allow an authenticated user with knowledge of FSSO policy configurations to gain unauthorized access to protected network resources via crafted requests.

Affected products

FortiOS
  • =<7.2.13
  • =<7.0.19
  • =<7.6.4
  • =<7.4.9

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-62631
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 1 week ago Activity log
  • Created suggestion
An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, …

An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control

Affected products

FortiOS
  • =<7.2.11
  • ==7.4.0
  • =<7.0.18
  • =<7.0.19
  • =<6.4.16

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-64157
6.7 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 1 week ago Activity log
  • Created suggestion
A use of externally-controlled format string vulnerability in Fortinet FortiOS …

A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0 all versions allows an authenticated admin to execute unauthorized code or commands via specifically crafted configuration.

Affected products

FortiOS
  • =<7.0.19
  • =<7.2.11
  • =<7.6.4
  • =<7.4.9

Matching in nixpkgs

Package maintainers