dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Mar 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled. | |
| Title | dns: memory‑safety issue in the DNS name parser | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zephyr
Published: 2026-03-05T06:21:36.907Z
Updated: 2026-03-05T15:28:42.914Z
Reserved: 2026-01-30T05:48:49.746Z
Link: CVE-2026-1678
No data.
Status : Received
Published: 2026-03-05T07:16:11.437
Modified: 2026-03-05T07:16:11.437
Link: CVE-2026-1678
No data.