uip_buf
, are not checked if they go out of bounds. In particular, this problem can occur when attempting to read the 2-byte option header and the Source Link-Layer Address Option (SLLAO). This attack requires ipv6 be enabled for the network. The problem has been patched in the develop branch of Contiki-NG. The upcoming 4.8 release of Contiki-NG will include the patch.Users unable to upgrade may apply the patch in Contiki-NG PR #1654.
▸ CVE-2024-9999 ◂ Discovered: 12/11/2024 Status: PUBLISHED |
▸ CVE-2024-9997 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
▸ CVE-2024-9996 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
Tags:
CVE-2022-35926 Vulnerability Details