Out-of-bounds Write The advisory has been revoked - it doesn't affect any version of package contiki-os/contiki Open this link in a new tab


    Threat Intelligence

    EPSS
    0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-CONTIKIOSCONTIKI-3252237
  • published 28 Jan 2023
  • disclosed 28 Jan 2023
  • credit Unknown

How to fix?

A fix was pushed into the master branch but not yet published.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write in the input_l2cap_frame_flow_channel() function in ble-l2cap.c. When fragments are reassembled in the BLE-L2CAP module they are stored in a packet buffer of a configurable size, but there is no check to verify that the packet buffer is large enough to hold the reassembled packet. An out-of-bounds write of up to 1152 bytes is possible.