Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: open5gs

Found 23 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-1736
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago Activity log
  • Created suggestion
Open5GS SGWC s11-handler.c assertion

A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c of the component SGWC. Such manipulation leads to reachable assertion. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. A patch should be applied to remediate this issue. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

  • nixos-unstable 2.7.6
    • nixpkgs-unstable 2.7.6
    • nixos-unstable-small 2.7.6
  • nixos-25.11 -
    • nixos-25.11-small 2.7.6
    • nixpkgs-25.11-darwin 2.7.6

Package maintainers

Untriaged
Permalink CVE-2026-1737
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 3 weeks ago Activity log
  • Created suggestion
Open5GS CreateBearerRequest s5c-handler.c sgwc_s5c_handle_create_bearer_request assertion

A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function sgwc_s5c_handle_create_bearer_request of the file /src/sgwc/s5c-handler.c of the component CreateBearerRequest Handler. Performing a manipulation results in reachable assertion. Remote exploitation of the attack is possible. The exploit is now public and may be used. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

  • nixos-unstable 2.7.6
    • nixpkgs-unstable 2.7.6
    • nixos-unstable-small 2.7.6
  • nixos-25.11 -
    • nixos-25.11-small 2.7.6
    • nixpkgs-25.11-darwin 2.7.6

Package maintainers

Untriaged
Permalink CVE-2026-1587
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 2 months, 4 weeks ago Activity log
  • Created suggestion
Open5GS SGWC s11-handler.c sgwc_s11_handle_modify_bearer_request denial of service

A vulnerability has been found in Open5GS up to 2.7.6. The affected element is the function sgwc_s11_handle_modify_bearer_request of the file /sgwc/s11-handler.c of the component SGWC. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Applying a patch is the recommended action to fix this issue. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Package maintainers

Untriaged
Permalink CVE-2026-1586
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
Open5GS SGWC s11-handler.c ogs_gtp2_f_teid_to_ip denial of service

A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Untriaged
Permalink CVE-2026-1522
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bearer_response denial of service

A weakness has been identified in Open5GS up to 2.7.6. This vulnerability affects the function sgwc_s5c_handle_modify_bearer_response of the file src/sgwc/s5c-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This patch is called b19cf6a. Applying a patch is advised to resolve this issue. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Untriaged
Permalink CVE-2026-1521
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 3 months ago Activity log
  • Created suggestion
Open5GS SGWC s5c-handler.c denial of service

A security flaw has been discovered in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_bearer_resource_failure_indication of the file src/sgwc/s5c-handler.c of the component SGWC. Performing a manipulation results in denial of service. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 69b53add90a9479d7960b822fc60601d659c328b. It is recommended to apply a patch to fix this issue.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Package maintainers

Published
Permalink CVE-2026-0622
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open 5GS WebUI uses a hard-coded JWT signing key

Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset

Affected products

open5GS
  • =<2.7.6

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Unmerged upstream PR: https://github.com/open5gs/open5gs/pull/857
Published
Permalink CVE-2025-15528
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS GTPv2 Bearer Response denial of service

A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/98f76e98df35cd6a35e868aa62715db7f8141ac1
Published
Permalink CVE-2025-15529
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/b19cf6a2dbf5d30811be4488bf059c865bd7d1d2
Published
Permalink CVE-2025-15539
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
updated 3 months, 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service

A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.5
  • ==2.7.6
  • ==2.7.1
  • ==2.7.2
  • ==2.7.4
  • ==2.7.3
  • ==2.7.0

Matching in nixpkgs

pkgs.open5gs

4G/5G core network components

Ignored packages (1)

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/b4707272c1caf6a7d4dca905694ea55557a0545f