Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2026-1678
9.4 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 weeks, 1 day ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt removed
    9 packages
    • python312Packages.smoke-zephyr
    • python313Packages.smoke-zephyr
    • python314Packages.smoke-zephyr
    • python312Packages.zephyr-python-api
    • python313Packages.zephyr-python-api
    • python314Packages.zephyr-python-api
    • python312Packages.zephyr-test-management
    • python313Packages.zephyr-test-management
    • python314Packages.zephyr-test-management
  • @mweinelt dismissed
dns: memory‑safety issue in the DNS name parser

dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.

Affected products

Zephyr
  • =<4.3
Ignored packages (9)
Not in nixpkgs