HomeDefectsLIN1025-6503
Acknowledged

LIN1025-6503 : Security Advisory - linux - CVE-2025-40363

Created: Dec 16, 2025    Updated: Dec 18, 2025
Found In Version: 10.25.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 25
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]net: ipv6: fix field-spanning memcpy warning in AH output[EOL][EOL]Fix field-spanning memcpy warnings in ah6_output() and[EOL]ah6_output_done() where extension headers are copied to/from IPv6[EOL]address fields, triggering fortify-string warnings about writes beyond[EOL]the 16-byte address fields.[EOL][EOL]  memcpy: detected field-spanning write (size 40) of single field "&top_iph->saddr" at net/ipv6/ah6.c:439 (size 16)[EOL]  WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439[EOL][EOL]The warnings are false positives as the extension headers are[EOL]intentionally placed after the IPv6 header in memory. Fix by properly[EOL]copying addresses and extension headers separately, and introduce[EOL]helper functions to avoid code duplication.
Live chat
Online