Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2025-15344
6.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
Tanium addressed a SQL injection vulnerability in Asset.

Tanium addressed a SQL injection vulnerability in Asset.

References

Affected products

Asset
  • <1.32.161
  • <1.28.254
  • <1.33.250

Matching in nixpkgs

pkgs.taro

Daemon for the Taproot Assets protocol specification

pkgs.cassette

GTK4/Adwaita application that allows you to use Yandex Music service on Linux operating systems

pkgs.assetfinder

Find domains and subdomains related to a given domain

pkgs.assetripper

Tool for extracting assets from Unity serialized files and asset bundles

pkgs.python312Packages.webassets

Media asset management for Python, with glue code for various web frameworks

  • nixos-unstable 2.0
    • nixpkgs-unstable 2.0
    • nixos-unstable-small 2.0
  • nixos-25.11 2.0
    • nixpkgs-25.11-darwin 2.0

pkgs.python313Packages.webassets

Media asset management for Python, with glue code for various web frameworks

  • nixos-unstable 2.0
    • nixpkgs-unstable 2.0
    • nixos-unstable-small 2.0
  • nixos-25.11 2.0
    • nixpkgs-25.11-darwin 2.0

Package maintainers

Permalink CVE-2020-36992
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 2 months, 3 weeks ago
Nord VPN-6.31.13.0 - 'nordvpn-service' Unquoted Service Path

Nord VPN 6.31.13.0 contains an unquoted service path vulnerability in its nordvpn-service that allows local attackers to execute code with elevated privileges. Attackers can exploit the unquoted binary path during system startup or reboot to potentially run malicious code with LocalSystem permissions.

Affected products

nordvpn
  • ==6.31.13.0

Matching in nixpkgs

pkgs.gnomeExtensions.gnordvpn-local

A Gnome extension that shows the NordVPN status in the top bar and provides the ability to configure certain aspects of the connection.

  • nixos-unstable 30
    • nixpkgs-unstable 30
    • nixos-unstable-small 30
  • nixos-25.11 30
    • nixpkgs-25.11-darwin 30

Package maintainers

Permalink CVE-2025-67723
4.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 3 weeks ago
Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin

Discourse is an open source discussion platform. Versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0 have a content-security-policy-mitigated cross-site scriptinv vulnerability on the Discourse Math plugin when using its KaTeX variant. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. As a workaround, the Discourse Math plugin can be disabled, or the Mathjax provider can be used instead of KaTeX.

Affected products

discourse
  • ==>= 2025.11.0-latest, < 2025.11.2
  • ==< 3.5.4
  • ==>= 2025.12.0-latest, < 2025.12.1
  • ==>= 2026.1.0-latest, < 2026.1.0

Matching in nixpkgs

pkgs.discourse

Discourse is an open source discussion platform

Package maintainers

Permalink CVE-2026-1539
5.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
created 2 months, 3 weeks ago
Libsoup: libsoup: credential leakage via http redirects

A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.

References

Affected products

libsoup
libsoup3

Matching in nixpkgs

Package maintainers

Permalink CVE-2024-52337
5.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 2 months, 3 weeks ago
Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method

A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.

References

Affected products

tuned
  • <2.24.1
  • *

Matching in nixpkgs

pkgs.tuned

Tuning Profile Delivery Mechanism for Linux

Package maintainers

Permalink CVE-2026-1522
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service

A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.3
  • ==2.7.6
  • ==2.7.1
  • ==2.7.5
  • ==2.7.2

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Package maintainers

Permalink CVE-2026-1521
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
Open5GS SGWC s5c-handler.c denial of service

A security flaw has been discovered in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_bearer_resource_failure_indication of the file src/sgwc/s5c-handler.c of the component SGWC. Performing a manipulation results in denial of service. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 69b53add90a9479d7960b822fc60601d659c328b. It is recommended to apply a patch to fix this issue.

Affected products

Open5GS
  • ==2.7.4
  • ==2.7.0
  • ==2.7.3
  • ==2.7.6
  • ==2.7.1
  • ==2.7.5
  • ==2.7.2

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Package maintainers

Permalink CVE-2026-1520
2.4 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago
rethinkdb Secondary Index cross site scripting

A vulnerability was identified in rethinkdb up to 2.4.3. Affected by this issue is some unknown functionality of the component Secondary Index Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

rethinkdb
  • ==2.4.1
  • ==2.4.3
  • ==2.4.2
  • ==2.4.0

Matching in nixpkgs

pkgs.rethinkdb

Open-source distributed database built with love

Package maintainers

Permalink CVE-2026-1536
5.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 months, 3 weeks ago
Libsoup: libsoup: http header injection or response splitting via crlf injection in content-disposition header

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

References

Affected products

libsoup
libsoup3

Matching in nixpkgs

Package maintainers

Permalink CVE-2025-68662
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
created 2 months, 3 weeks ago
FinalDestination hostname matching allows SSRF protection bypass

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, a hostname validation issue in FinalDestination could allow bypassing SSRF protections under certain conditions. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

Affected products

discourse
  • ==>= 2026.1.0-latest, < 2026.1.0
  • ==>= 2025.11.0-latest, < 2025.11.2
  • ==>= 2025.12.0-latest, < 2025.12.1
  • ==< 3.5.4

Matching in nixpkgs

pkgs.discourse

Discourse is an open source discussion platform

Package maintainers