Skip to content

net: ipv6: Make sure we do not access link address past array length #90576

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

jukkar
Copy link
Member

@jukkar jukkar commented May 26, 2025

It is possible to manually set link address length past 6 at runtime and trying to generate IPv6 IID address that way. This should fail as we could read two bytes past the address buffer. There is no issues in the copying as the target buffer has plenty of space.

Fixes #90544
Coverity-CID: 516232

It is possible to manually set link address length past 6 at runtime
and trying to generate IPv6 IID address that way. This should fail
as we could read two bytes past the address buffer. There is no issues
in the copying as the target buffer has plenty of space.

Coverity-CID: 516232

Signed-off-by: Jukka Rissanen <jukka.rissanen@nordicsemi.no>
@kartben kartben merged commit e44ed8d into zephyrproject-rtos:main May 28, 2025
26 checks passed
@jukkar jukkar deleted the fix/90544/coverity-out-of-bounds-ipv6 branch May 28, 2025 08:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Coverity CID: 516232] Out-of-bounds access in subsys/net/ip/ipv6.c
4 participants