Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1354

NIXPKGS-2026-1354
published on
Permalink CVE-2026-40684
5.9 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 4 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 maintainers
    • @4z3
    • @dasJ
    • @Conni2461
    • @helsinki-Jo
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
In Exim before 4.99.2, on systems using musl libc (not …

In Exim before 4.99.2, on systems using musl libc (not glibc), an attacker can crash the connection instance when malformed DNS data is present in PTR records. This is caused by a dn_expand oddity in octal printing.

Affected products

Exim
  • <4.99.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (4)