Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2026-0849
3.8 LOW
  • CVSS version: 3.1
  • Attack vector (AV): PHYSICAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): LOW
updated 6 days, 21 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    9 packages
    • python312Packages.smoke-zephyr
    • python313Packages.smoke-zephyr
    • python314Packages.smoke-zephyr
    • python312Packages.zephyr-python-api
    • python313Packages.zephyr-python-api
    • python314Packages.zephyr-python-api
    • python312Packages.zephyr-test-management
    • python313Packages.zephyr-test-management
    • python314Packages.zephyr-test-management
  • @LeSuisse dismissed
crypto: ATAES132A response length allows stack buffer overflow

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.

Affected products

Zephyr
  • =<4.3
Ignored packages (9)
Not present in nixpkgs