Skip to content

net: ipv6: Do not access link address past array length #90578

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

jukkar
Copy link
Member

@jukkar jukkar commented May 26, 2025

It is possible to manually set link address length past 6 at runtime and trying to check IPv6 ll address that way. This should fail as we could read two bytes past the address buffer.

Fixes #90535
Coverity-CID: 516242

It is possible to manually set link address length past 6 at runtime
and trying to check IPv6 ll address that way. This should fail
as we could read two bytes past the address buffer.

Coverity-CID: 516242

Signed-off-by: Jukka Rissanen <jukka.rissanen@nordicsemi.no>
@kartben kartben merged commit d718b46 into zephyrproject-rtos:main May 28, 2025
26 checks passed
@jukkar jukkar deleted the fix/90535/coverity-out-of-bounds-net_ip.h branch May 28, 2025 08:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Coverity CID: 516242] Out-of-bounds access in include/zephyr/net/net_ip.h
4 participants