Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: kcp

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-39429
8.2 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 6 days, 16 hours ago
kcp's cache server is accessible without authentication or authorization checks

kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place. This allows anyone who can access the root shard to read and write to the cache server. This vulnerability is fixed in 0.30.3 and 0.29.3.

Affected products

kcp
  • ==>= 0.30.0, < 0.30.3
  • ==< 0.29.3

Matching in nixpkgs

pkgs.kcp

Fast and Reliable ARQ Protocol

  • nixos-unstable 1.7
    • nixpkgs-unstable 1.7
    • nixos-unstable-small 1.7
  • nixos-25.11 1.7
    • nixos-25.11-small 1.7
    • nixpkgs-25.11-darwin 1.7

pkgs.kubernetes-kcp

Kubernetes-like control planes for form-factors and use-cases beyond Kubernetes and container workloads

Package maintainers