dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 05 Mar 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled. | |
| Title | dns: memory‑safety issue in the DNS name parser | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2026-03-05T06:21:36.907Z
Reserved: 2026-01-30T05:48:49.746Z
Link: CVE-2026-1678
No data.
Status : Received
Published: 2026-03-05T07:16:11.437
Modified: 2026-03-05T07:16:11.437
Link: CVE-2026-1678
No data.
OpenCVE Enrichment
No data.
Weaknesses