Activity log
- Created suggestion
RIOT Vulnerable to Multiple Out-of-Bounds Read When Processing Received 6LoWPAN SFR Fragments
RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In version 2025.10 and prior, multiple out-of-bounds read allow any unauthenticated user, with ability to send or manipulate input packets, to read adjacent memory locations, or crash a vulnerable device running the 6LoWPAN stack. The received packet is cast into a sixlowpan_sfr_rfrag_t struct and dereferenced without validating the packet is large enough to contain the struct object. At time of publication, no known patch exists.
References
-
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-c8fh-23qr-97mc x_refsource_CONFIRM
Affected products
- ==<= 2025.10
Matching in nixpkgs
pkgs.aisleriot
Collection of patience games written in guile scheme
pkgs.riot-redis
Get data in and out of Redis
pkgs.superiotool
User-space utility to detect Super I/O of a mainboard and provide detailed information about the register contents of the Super I/O
Package maintainers
-
@jtojnar Jan Tojnar <jtojnar@gmail.com>
-
@hedning Tor Hedin Brønner <torhedinbronner@gmail.com>
-
@bobby285271 Bobby Rong <rjl931189261@126.com>
-
@dasj19 Daniel Șerbănescu <daniel@serbanescu.dk>
-
@wesnel Wesley Nelson <wgn@wesnel.dev>
-
@felixsinger Felix Singer <felixsinger@posteo.net>
-
@jmbaur Jared Baur <jaredbaur@fastmail.com>