UBUNTU-CVE-2026-33246

Source
https://ubuntu.com/security/CVE-2026-33246
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33246.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-33246
Upstream
  • CVE-2026-33246
Published
2026-03-27T00:00:00Z
Modified
2026-03-27T17:20:15.175848Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. The nats-server offers a Nats-Request-Info: message header, providing information about a request. This is supposed to provide enough information to allow for account/user identification, such that NATS clients could make their own decisions on how to trust a message, provided that they trust the nats-server as a broker. A leafnode connecting to a nats-server is not fully trusted unless the system account is bridged too. Thus identity claims should not have propagated unchecked. Prior to versions 2.11.15 and 2.12.6, NATS clients relying upon the Nats-Request-Info: header could be spoofed. This does not directly affect the nats-server itself, but the CVSS Confidentiality and Integrity scores are based upon what a hypothetical client might choose to do with this NATS header. Versions 2.11.15 and 2.12.6 contain a fix. No known workarounds are available.

References

Affected packages

Ubuntu:24.04:LTS / nats-server

Package

Name
nats-server
Purl
pkg:deb/ubuntu/nats-server@2.10.7-1ubuntu0.3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.9.19-1build1
2.10.3-1
2.10.4-1
2.10.7-1
2.10.7-1ubuntu0.1
2.10.7-1ubuntu0.2
2.10.7-1ubuntu0.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-nats-io-nats-server-dev",
            "binary_version": "2.10.7-1ubuntu0.3"
        },
        {
            "binary_name": "nats-server",
            "binary_version": "2.10.7-1ubuntu0.3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33246.json"

Ubuntu:25.10 / nats-server

Package

Name
nats-server
Purl
pkg:deb/ubuntu/nats-server@2.10.27-1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.10.24-1
2.10.27-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "golang-github-nats-io-nats-server-dev",
            "binary_version": "2.10.27-1"
        },
        {
            "binary_name": "nats-server",
            "binary_version": "2.10.27-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33246.json"