Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestion detail

Untriaged
Permalink CVE-2026-2967
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 3 weeks ago
Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.17
  • ==7.4
  • ==7.19
  • ==7.7
  • ==7.2
  • ==7.3
  • ==7.20
  • ==7.1
  • ==7.0
  • ==7.18
  • ==7.10
  • ==7.11
  • ==7.16
  • ==7.9
  • ==7.14
  • ==7.13
  • ==7.15
  • ==7.6
  • ==7.8
  • ==7.12
  • ==7.5

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers