Acknowledged
Created: Dec 16, 2025
Updated: Dec 18, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]net: ipv6: fix field-spanning memcpy warning in AH output[EOL][EOL]Fix field-spanning memcpy warnings in ah6_output() and[EOL]ah6_output_done() where extension headers are copied to/from IPv6[EOL]address fields, triggering fortify-string warnings about writes beyond[EOL]the 16-byte address fields.[EOL][EOL] memcpy: detected field-spanning write (size 40) of single field "&top_iph->saddr" at net/ipv6/ah6.c:439 (size 16)[EOL] WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439[EOL][EOL]The warnings are false positives as the extension headers are[EOL]intentionally placed after the IPv6 header in memory. Fix by properly[EOL]copying addresses and extension headers separately, and introduce[EOL]helper functions to avoid code duplication.