You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The function that processes the IPv6 Hop-by-Hop extension header does not check the validity of its options lengths, allowing attackers to corrupt memory.
Root cause
An issue was discovered in FNET through 4.6.4. The code for processing the hop-by-hop header (in the IPv6 extension headers) doesn't check for a valid length of an extension header, and therefore an out-of-bounds read can occur in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to Denial-of-Service.
Description
Root cause
Software
Name
FNET
Versions affected
≤ 4.6.4
Links
The text was updated successfully, but these errors were encountered: