Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: open5gs

Found 9 matching suggestions

updated 4 days, 2 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS MME esm-build.c memory corruption

A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is an unknown function of the file /src/mme/esm-build.c of the component MME. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream issue: https://github.com/open5gs/open5gs/issues/4283
updated 4 days, 2 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS SGW-C sgwc_s5c_handle_create_session_response memory corruption

A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/open5gs/open5gs/issues/4282
updated 4 days, 2 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS SMF types.c ogs_gtp2_parse_tft denial of service

A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream issue: https://github.com/open5gs/open5gs/issues/4281
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS PGW S5U Address sgwc_sxa_handle_session_modification_response null pointer dereference

A vulnerability was identified in Open5GS up to 2.7.6. This affects the function sgwc_s5c_handle_modify_bearer_response/sgwc_sxa_handle_session_modification_response of the component PGW S5U Address Handler. The manipulation leads to null pointer dereference. The attack can be initiated remotely. The exploit is publicly available and might be used. The identifier of the patch is f1bbd7b57f831e2a070780a7d8d5d4c73babdb59. Applying a patch is the recommended action to fix this issue.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/f1bbd7b57f831e2a070780a7d8d5d4c73babdb59
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_mar_cb stack-based overflow

A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the function hss_ogs_diam_cx_mar_cb of the file src/hss/hss-cx-path.c of the component VoLTE Cx-Test. The manipulation of the argument OGS_KEY_LEN results in stack-based buffer overflow. The attack may be launched remotely. The patch is identified as 54dda041211098730221d0ae20a2f9f9173e7a21. A patch should be applied to remediate this issue.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/54dda041211098730221d0ae20a2f9f9173e7a21
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open 5GS WebUI uses a hard-coded JWT signing key

Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset

Affected products

open5GS
  • =<2.7.6

Matching in nixpkgs

Package maintainers

Unmerged upstream PR: https://github.com/open5gs/open5gs/pull/857
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS GTPv2 Bearer Response denial of service

A vulnerability has been found in Open5GS up to 2.7.6. Affected by this vulnerability is an unknown functionality of the component GTPv2 Bearer Response Handler. Such manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 98f76e98df35cd6a35e868aa62715db7f8141ac1. A patch should be applied to remediate this issue.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/98f76e98df35cd6a35e868aa62715db7f8141ac1
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS s5c-handler.c sgwc_s5c_handle_create_session_response denial of service

A vulnerability was found in Open5GS up to 2.7.6. Affected by this issue is the function sgwc_s5c_handle_create_session_response of the file src/sgwc/s5c-handler.c. Performing a manipulation results in denial of service. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The patch is named b19cf6a2dbf5d30811be4488bf059c865bd7d1d2. To fix this issue, it is recommended to deploy a patch.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/b19cf6a2dbf5d30811be4488bf059c865bd7d1d2
updated 1 month ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package open5gs-webui
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Open5GS sgwc s11-handler.c sgwc_s11_handle_downlink_data_notification_ack denial of service

A vulnerability was determined in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_downlink_data_notification_ack of the file src/sgwc/s11-handler.c of the component sgwc. This manipulation causes denial of service. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: b4707272c1caf6a7d4dca905694ea55557a0545f. To fix this issue, it is recommended to deploy a patch. The issue report is flagged as already-fixed.

Affected products

Open5GS
  • ==2.7.3
  • ==2.7.5
  • ==2.7.0
  • ==2.7.4
  • ==2.7.1
  • ==2.7.6
  • ==2.7.2

Matching in nixpkgs

Package maintainers

Upstream patch: https://github.com/open5gs/open5gs/commit/b4707272c1caf6a7d4dca905694ea55557a0545f