Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0071

NIXPKGS-2026-0071
published on
Permalink CVE-2026-22045
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 3 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored package traefik-certs-dumper
  • @LeSuisse deleted maintainer @NickCao maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Traefik's ACME TLS-ALPN fast path lacks timeouts and close on handshake stall

Traefik is an HTTP reverse proxy and load balancer. Prior to 2.11.35 and 3.6.7, there is a potential vulnerability in Traefik ACME TLS certificates' automatic generation: the ACME TLS-ALPN fast path can allow unauthenticated clients to tie up go routines and file descriptors indefinitely when the ACME TLS challenge is enabled. A malicious client can open many connections, send a minimal ClientHello with acme-tls/1, then stop responding, leading to denial of service of the entry point. The vulnerability is fixed in 2.11.35 and 3.6.7.

Affected products

traefik
  • ==>=3.0.0-beta1, < 3.6.7
  • ==< 2.11.35

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Upstream advisory: https://github.com/traefik/traefik/security/advisories/GHSA-cwjm-3f7h-9hwq
Upstream fix: https://github.com/traefik/traefik/commit/e9f3089e9045812bcf1b410a9d40568917b26c3d