Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Automatically generated suggestions

to slate a suggestion for refinement.

to mark a suggestion as irrelevant and log the reason.

View:
Compact
Detailed
Permalink CVE-2026-21381
7.6 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): HIGH
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in WLAN Firmware

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

Affected products

Snapdragon
  • ==QCA6777AQ
  • ==WSA8840
  • ==SM8635P
  • ==Snapdragon 6 Gen 4 Mobile Platform
  • ==SXR2230P
  • ==WSA8845H
  • ==WSA8830
  • ==AR8035
  • ==WCD9370
  • ==WCN7880
  • ==QFW7114
  • ==QCC2073
  • ==X2000077
  • ==FastConnect 6900
  • ==SAR1165P
  • ==QCN6224
  • ==WCD9380
  • ==X2000090
  • ==QXM1083
  • ==QPA1086BD
  • ==Snapdragon AR1+ Gen 1 Platform
  • ==WCD9390
  • ==Snapdragon 6 Gen 3 Mobile Platform
  • ==FastConnect 7800
  • ==XG101032
  • ==FastConnect 6200
  • ==Cologne
  • ==Snapdragon 8 Gen 3 Mobile Platform
  • ==FastConnect 6700
  • ==QLN1083BD
  • ==WSA8835
  • ==QLN1086BD
  • ==XRV9209
  • ==Snapdragon 8 Elite Gen 5
  • ==SM8635
  • ==SM8750P
  • ==SXR2330P
  • ==WCD9378
  • ==SXR2250P
  • ==SC8380XP
  • ==WCN7860
  • ==Snapdragon AR1 Gen 1 Platform
  • ==WCD9378C
  • ==G2 Gen 1
  • ==Snapdragon 6 Gen 1 Mobile Platform
  • ==QCA8081
  • ==XG101039
  • ==QPA1083BD
  • ==SM6650P
  • ==QXM1096
  • ==QXM1086
  • ==QCA6787AQ
  • ==QCA6797AQ
  • ==Milos
  • ==Snapdragon X72 5G Modem-RF System
  • ==QCS8550
  • ==X2000086
  • ==QCA6698AU
  • ==QCC2076
  • ==WSA8815
  • ==Netrani
  • ==SXR2350P
  • ==QXM1095
  • ==Orne
  • ==X2000092
  • ==WCN6650
  • ==XRV7209
  • ==QFW7124
  • ==WCD9385
  • ==SM7675P
  • ==QMP1000
  • ==WCD9375
  • ==FWA Gen 3 Ultra Platform
  • ==WCN7861
  • ==QCN9012
  • ==WCN7881
  • ==QXM1093
  • ==SM7435
  • ==Snapdragon 8 Elite
  • ==WSA8810
  • ==SM7675
  • ==SM7635P
  • ==QCN6274
  • ==WCN3988
  • ==Palawan25
  • ==WSA8845
  • ==Snapdragon 7s Gen 3 Mobile Platform
  • ==QCC710
  • ==QCN9011
  • ==SM8650Q
  • ==SAR2130P
  • ==WCD9395
  • ==XG101002
  • ==QCA8337
  • ==Snapdragon X75 5G Modem-RF System
  • ==QCA6391
  • ==Pandeiro
  • ==WCN6755
  • ==WSA8832
  • ==QXM1094
  • ==X2000094
  • ==WCD9340
  • ==WCN6450

Matching in nixpkgs

Permalink CVE-2026-5663
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 4 days ago
OFFIS DCMTK storescp storescp.cc executeOnEndOfStudy os command injection

A security flaw has been discovered in OFFIS DCMTK up to 3.7.0. This impacts the function executeOnReception/executeOnEndOfStudy of the file dcmnet/apps/storescp.cc of the component storescp. Performing a manipulation results in os command injection. Remote exploitation of the attack is possible. The patch is named edbb085e45788dccaf0e64d71534cfca925784b8. Applying a patch is the recommended action to fix this issue.

Affected products

DCMTK
  • ==3.2
  • ==3.0
  • ==3.1
  • ==3.6
  • ==3.3
  • ==3.7.0
  • ==3.4
  • ==3.5

Matching in nixpkgs

pkgs.dcmtk

Collection of libraries and applications implementing large parts of the DICOM standard

Package maintainers

created 1 week, 4 days ago
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

Affected products

goshs
  • ==< 2.0.0-beta.3

Matching in nixpkgs

pkgs.goshs

Simple, yet feature-rich web server written in Go

Package maintainers

Permalink CVE-2026-29047
7.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): HIGH
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
GLPI has an Authenticated SQL Injection via log exports

GLPI is a free asset and IT management software package. From 10.0.0 to before 10.0.24 and 11.0.6, an authenticated user can perform a SQL injection via the logs export feature. This vulnerability is fixed in 10.0.24 and 11.0.6.

Affected products

glpi
  • ==>= 11.0.0-alpha, < 11.0.6
  • ==>= 10.0.0, 10.0.24

Matching in nixpkgs

pkgs.glpi-agent

GLPI unified Agent for UNIX, Linux, Windows and MacOSX

  • nixos-unstable 1.16
    • nixpkgs-unstable 1.16
    • nixos-unstable-small 1.16
  • nixos-25.11 1.16
    • nixos-25.11-small 1.16
    • nixpkgs-25.11-darwin 1.16

Package maintainers

Permalink CVE-2026-34776
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 1 week, 4 days ago
Electron: Out-of-bounds read in second-instance IPC on macOS and Linux

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, on macOS and Linux, apps that call app.requestSingleInstanceLock() were vulnerable to an out-of-bounds heap read when parsing a crafted second-instance message. Leaked memory could be delivered to the app's second-instance event handler. This issue is limited to processes running as the same user as the Electron app. Apps that do not call app.requestSingleInstanceLock() are not affected. Windows is not affected by this issue. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

Affected products

electron
  • ==>= 41.0.0-alpha.1, < 41.0.0
  • ==< 38.8.6
  • ==>= 39.0.0-alpha.1, < 39.8.1
  • ==>= 40.0.0-alpha.1, < 40.8.1

Matching in nixpkgs

pkgs.electron_35

Cross platform desktop application shell

pkgs.electron_36

Cross platform desktop application shell

pkgs.gfn-electron

Linux Desktop client for Nvidia's GeForce NOW game streaming service

pkgs.electron-mail

ElectronMail is an Electron-based unofficial desktop client for ProtonMail

Permalink CVE-2026-21371
7.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Buffer Over-read in WinBlast Driver

Memory Corruption when retrieving output buffer with insufficient size validation.

Affected products

Snapdragon
  • ==SM6250
  • ==Snapdragon 8cx Compute Platform "Poipu Pro"
  • ==Snapdragon 662 Mobile Platform
  • ==Snapdragon 8cx Compute Platform
  • ==FastConnect 7800
  • ==QCM5430
  • ==WCD9340
  • ==Cologne
  • ==WCD9378C
  • ==AQT1000
  • ==WSA8845H
  • ==Snapdragon 8cx Gen 3 Compute Platform
  • ==QCA6391
  • ==WCD9341
  • ==WCD9385
  • ==WCD9370
  • ==WSA8840
  • ==X2000090
  • ==XG101032
  • ==QCM6490
  • ==WCN3950
  • ==SC8380XP
  • ==X2000092
  • ==Snapdragon 8cx Gen 2 5G Compute Platform "Poipu Pro"
  • ==Snapdragon 7c Compute Platform
  • ==Snapdragon 7c+ Gen 3 Compute
  • ==FastConnect 6900
  • ==FastConnect 6200
  • ==X2000077
  • ==FastConnect 6700
  • ==WSA8845
  • ==FastConnect 6800
  • ==Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
  • ==X2000094
  • ==WSA8835
  • ==XG101039
  • ==Snapdragon 8cx Gen 2 5G Compute Platform
  • ==WSA8815
  • ==WSA8830
  • ==Snapdragon 8c Compute Platform "Poipu Lite"
  • ==QCA0000
  • ==Qualcomm Video Collaboration VC3 Platform
  • ==XG101002
  • ==Snapdragon 460 Mobile Platform
  • ==QCA6430
  • ==WCD9375
  • ==Snapdragon 7c Gen 2 Compute Platform "Rennell Pro"
  • ==WSA8810
  • ==QCA6420
  • ==X2000086
  • ==WCD9380
  • ==WCN3988

Matching in nixpkgs

Permalink CVE-2026-34779
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): LOW
created 1 week, 4 days ago
Electron: AppleScript injection in app.moveToApplicationsFolder on macOS

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8, on macOS, app.moveToApplicationsFolder() used an AppleScript fallback path that did not properly handle certain characters in the application bundle path. Under specific conditions, a crafted launch path could lead to arbitrary AppleScript execution when the user accepted the move-to-Applications prompt. Apps are only affected if they call app.moveToApplicationsFolder(). Apps that do not use this API are not affected. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.0, and 41.0.0-beta.8.

Affected products

electron
  • ==>= 40.0.0-alpha.1, < 40.8.0
  • ==< 38.8.6
  • ==>= 39.0.0-alpha.1, < 39.8.1
  • ==>= 41.0.0-alpha.1, < 41.0.0-beta.8

Matching in nixpkgs

pkgs.electron_35

Cross platform desktop application shell

pkgs.electron_36

Cross platform desktop application shell

pkgs.gfn-electron

Linux Desktop client for Nvidia's GeForce NOW game streaming service

pkgs.electron-mail

ElectronMail is an Electron-based unofficial desktop client for ProtonMail

Permalink CVE-2026-34756
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
created 1 week, 4 days ago
vLLM Affected by Unauthenticated OOM Denial of Service via Unbounded `n` Parameter in OpenAI API Server

vLLM is an inference and serving engine for large language models (LLMs). From 0.1.0 to before 0.19.0, a Denial of Service vulnerability exists in the vLLM OpenAI-compatible API server. Due to the lack of an upper bound validation on the n parameter in the ChatCompletionRequest and CompletionRequest Pydantic models, an unauthenticated attacker can send a single HTTP request with an astronomically large n value. This completely blocks the Python asyncio event loop and causes immediate Out-Of-Memory crashes by allocating millions of request object copies in the heap before the request even reaches the scheduling queue. This vulnerability is fixed in 0.19.0.

Affected products

vllm
  • ==>= 0.1.0, < 0.19.0

Matching in nixpkgs

pkgs.vllm

High-throughput and memory-efficient inference and serving engine for LLMs

Package maintainers

Permalink CVE-2026-34379
7.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): HIGH
created 1 week, 4 days ago
OpenEXR has a misaligned write in LossyDctDecoder_execute leading to undefined behavior (DWA/DWAB decompression)

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. From 3.2.0 to before 3.2.7, 3.3.9, and 3.4.9, a misaligned memory write vulnerability exists in LossyDctDecoder_execute() in src/lib/OpenEXRCore/internal_dwa_decoder.h:749. When decoding a DWA or DWAB-compressed EXR file containing a FLOAT-type channel, the decoder performs an in-place HALF→FLOAT conversion by casting an unaligned uint8_t * row pointer to float * and writing through it. Because the row buffer may not be 4-byte aligned, this constitutes undefined behavior under the C standard and crashes immediately on architectures that enforce alignment (ARM, RISC-V, etc.). On x86 it is silently tolerated at runtime but remains exploitable via compiler optimizations that assume aligned access. This vulnerability is fixed in 3.2.7, 3.3.9, and 3.4.9.

Affected products

openexr
  • ==>= 3.2.0, < 3.2.7
  • ==>= 3.4.0, < 3.4.9
  • ==>= 3.3.0, < 3.3.9

Matching in nixpkgs

pkgs.openexr

High dynamic-range (HDR) image file format

Package maintainers

Permalink CVE-2026-34774
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 1 week, 4 days ago
Electron: Use-after-free in offscreen child window paint callback

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to a use-after-free. If the parent offscreen WebContents is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering (webPreferences.offscreen: true) and their setWindowOpenHandler permits child windows. Apps that do not use offscreen rendering, or that deny child windows, are not affected. This issue has been patched in versions 39.8.1, 40.7.0, and 41.0.0.

Affected products

electron
  • ==>= 41.0.0-alpha.1, < 41.0.0
  • ==< 39.8.1
  • ==>= 40.0.0-alpha.1, < 40.7.0

Matching in nixpkgs

pkgs.electron_35

Cross platform desktop application shell

pkgs.electron_36

Cross platform desktop application shell

pkgs.gfn-electron

Linux Desktop client for Nvidia's GeForce NOW game streaming service

pkgs.electron-mail

ElectronMail is an Electron-based unofficial desktop client for ProtonMail