Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1172

NIXPKGS-2026-1172
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package miniupnpd-nftables
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
miniupnpd Integer Underflow SOAPAction Header Parsing

miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.

Affected products

miniupnpd
  • <2.3.10

Matching in nixpkgs

pkgs.miniupnpd

Daemon that implements the UPnP Internet Gateway Device (IGD) specification

Ignored packages (1)

pkgs.miniupnpd-nftables

Daemon that implements the UPnP Internet Gateway Device (IGD) specification