Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: riot-redis

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-27703
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): HIGH
  • Availability impact (A): NONE
created 1 week, 3 days ago
RIOT has an Out-of-Bounds Write in nanoCoAP Handler

RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In 2026.01 and earlier, the default handler for the well_known_core resource coap_well_known_core_default_handler writes user-provided option data and other data into a fixed size buffer without validating the buffer is large enough to contain the response. This vulnerability allows an attacker to corrupt neighboring stack location, including security-sensitive addresses like the return address, leading to denial of service or arbitrary code execution.

Affected products

RIOT
  • ==<= 2026.01

Matching in nixpkgs

pkgs.superiotool

User-space utility to detect Super I/O of a mainboard and provide detailed information about the register contents of the Super I/O

Package maintainers