Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0952

NIXPKGS-2026-0952
published on
Permalink CVE-2026-3184
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 day, 16 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package more
  • @LeSuisse removed package wall
  • @LeSuisse removed package mount
  • @LeSuisse removed package eject
  • @LeSuisse removed package umount
  • @LeSuisse removed package logger
  • @LeSuisse removed package hexdump
  • @LeSuisse removed package libuuid
  • @LeSuisse removed package libsmartcols
  • @LeSuisse removed package unixtools.col
  • @LeSuisse removed package unixtools.fsck
  • @LeSuisse removed package unixtools.more
  • @LeSuisse removed package unixtools.wall
  • @LeSuisse removed package unixtools.eject
  • @LeSuisse removed package unixtools.fdisk
  • @LeSuisse removed package unixtools.mount
  • @LeSuisse removed package unixtools.write
  • @LeSuisse removed package unixtools.column
  • @LeSuisse removed package unixtools.getopt
  • @LeSuisse removed package unixtools.logger
  • @LeSuisse removed package unixtools.script
  • @LeSuisse removed package unixtools.umount
  • @LeSuisse removed package unixtools.hexdump
  • @LeSuisse removed package unixtools.whereis
  • @LeSuisse removed package util-linuxMinimal
  • @LeSuisse removed package uutils-util-linux
  • @LeSuisse removed package unixtools.util-linux
  • @LeSuisse ignored reference https://a…
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Util-linux: util-linux: access control bypass due to improper hostname canonicalization

A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified domain names. This could lead to unauthorized access.

References

Ignored references (1)

Affected products

rhcos
util-linux

Matching in nixpkgs

Ignored packages (27)

Package maintainers

Patch: https://github.com/util-linux/util-linux/commit/8b29aeb081e297e48c4c1ac53d88ae07e1331984