Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: mongoose

Found 5 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2026-5246
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 5 days ago
Cesanta Mongoose P-384 Public Key mongoose.c mg_tls_verify_cert_signature authorization

A vulnerability was determined in Cesanta Mongoose up to 7.20. Affected is the function mg_tls_verify_cert_signature of the file mongoose.c of the component P-384 Public Key Handler. Executing a manipulation can lead to authorization bypass. The attack can be executed remotely. Attacks of this nature are highly complex. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. Upgrading to version 7.21 is able to address this issue. This patch is called 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

Mongoose
  • ==7.9
  • ==7.7
  • ==7.2
  • ==7.16
  • ==7.6
  • ==7.21
  • ==7.8
  • ==7.17
  • ==7.5
  • ==7.14
  • ==7.15
  • ==7.19
  • ==7.18
  • ==7.3
  • ==7.20
  • ==7.13
  • ==7.1
  • ==7.4
  • ==7.10
  • ==7.12
  • ==7.11
  • ==7.0

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers

Untriaged
Permalink CVE-2026-5244
7.3 HIGH
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 5 days ago
Cesanta Mongoose TLS 1.3 mongoose.c mg_tls_recv_cert heap-based overflow

A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the function mg_tls_recv_cert of the file mongoose.c of the component TLS 1.3 Handler. Such manipulation of the argument pubkey leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.21 mitigates this issue. The name of the patch is 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

Mongoose
  • ==7.9
  • ==7.7
  • ==7.2
  • ==7.16
  • ==7.6
  • ==7.21
  • ==7.8
  • ==7.17
  • ==7.5
  • ==7.14
  • ==7.15
  • ==7.19
  • ==7.18
  • ==7.3
  • ==7.20
  • ==7.13
  • ==7.1
  • ==7.4
  • ==7.10
  • ==7.12
  • ==7.11
  • ==7.0

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers

Untriaged
Permalink CVE-2026-5245
5.6 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 week, 5 days ago
Cesanta Mongoose mDNS Record mongoose.c handle_mdns_record stack-based overflow

A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Affected products

Mongoose
  • ==7.9
  • ==7.7
  • ==7.2
  • ==7.16
  • ==7.6
  • ==7.21
  • ==7.8
  • ==7.17
  • ==7.5
  • ==7.14
  • ==7.15
  • ==7.19
  • ==7.18
  • ==7.3
  • ==7.20
  • ==7.13
  • ==7.1
  • ==7.4
  • ==7.10
  • ==7.12
  • ==7.11
  • ==7.0

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers

Untriaged
Permalink CVE-2026-2966
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 3 weeks ago
Cesanta Mongoose DNS Transaction ID dns.c mg_sendnsreq random values

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.2
  • ==7.20
  • ==7.11
  • ==7.4
  • ==7.8
  • ==7.14
  • ==7.0
  • ==7.9
  • ==7.17
  • ==7.1
  • ==7.7
  • ==7.5
  • ==7.12
  • ==7.3
  • ==7.18
  • ==7.13
  • ==7.15
  • ==7.16
  • ==7.6
  • ==7.10
  • ==7.19

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers

Untriaged
Permalink CVE-2026-2967
3.7 LOW
  • CVSS version: 3.1
  • Attack vector (AV):
  • Attack complexity (AC):
  • Privileges required (PR):
  • User interaction (UI):
  • Scope (S):
  • Confidentiality impact (C):
  • Integrity impact (I):
  • Availability impact (A):
created 1 month, 3 weeks ago
Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Affected products

Mongoose
  • ==7.17
  • ==7.4
  • ==7.19
  • ==7.7
  • ==7.2
  • ==7.3
  • ==7.20
  • ==7.1
  • ==7.0
  • ==7.18
  • ==7.10
  • ==7.11
  • ==7.16
  • ==7.9
  • ==7.14
  • ==7.13
  • ==7.15
  • ==7.6
  • ==7.8
  • ==7.12
  • ==7.5

Matching in nixpkgs

pkgs.mongoose

Graph Coarsening and Partitioning Library

Package maintainers