dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.
References
| Link | Resource |
|---|---|
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-536f-h63g-hj42 | Exploit Patch Vendor Advisory |
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-536f-h63g-hj42 | Exploit Patch Vendor Advisory |
Configurations
History
09 Mar 2026, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zephyrproject
Zephyrproject zephyr |
|
| References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-536f-h63g-hj42 - Exploit, Patch, Vendor Advisory | |
| CPE | cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | |
| Summary |
|
05 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-536f-h63g-hj42 - |
05 Mar 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 07:16
Updated : 2026-03-09 18:33
NVD link : CVE-2026-1678
Mitre link : CVE-2026-1678
CVE.ORG link : CVE-2026-1678
JSON object : View
Products Affected
zephyrproject
- zephyr
CWE
CWE-787
Out-of-bounds Write
