Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled. | |
| Title | dns: memory‑safety issue in the DNS name parser | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2026-03-05T15:28:42.914Z
Reserved: 2026-01-30T05:48:49.746Z
Link: CVE-2026-1678
Updated: 2026-03-05T15:27:52.161Z
Status : Received
Published: 2026-03-05T07:16:11.437
Modified: 2026-03-05T16:16:13.493
Link: CVE-2026-1678
No data.
OpenCVE Enrichment
No data.