zephyr/subsys/net
Robert Lubos 51726f3648 net: l2: ieee802154: shell: Validate address on input
Associate command handler did not validate the provided address length.
In result, if provided address string was longer than the expected
extended address size, strncpy() would not NULL terminate the buffer,
which could lead to unexpected behavior in parse_extended_address(), as
it expects NULL terminated string.

Fix this by validating the length of the provided address string before
parsing.

Additionally, make parse_extended_address() return the parsing result,
so that it can be detected when provided extended address has incorrect
format.

Signed-off-by: Robert Lubos <robert.lubos@nordicsemi.no>
2023-07-20 10:47:39 +00:00
..
conn_mgr net: conn_mgr: Create conn_mgr thread dynamically 2023-07-14 09:37:37 +02:00
ip net: if: Fix if_ipv4_get_addr() locking 2023-07-14 09:37:14 +02:00
l2 net: l2: ieee802154: shell: Validate address on input 2023-07-20 10:47:39 +00:00
lib net: lib: tls_credentials: earlier initialisation 2023-07-12 14:50:09 +02:00
pkt_filter net: pkt_filter: Introduce additional hooks for pkt_filter 2023-07-10 09:27:47 +02:00
buf_simple.c net: buf: Factor out net_buf_simple to separate source file 2023-03-15 10:50:16 +01:00
buf.c net: buf: fix data ref_count offset in generic_data_ref() 2023-05-31 10:01:40 -04:00
CMakeLists.txt net: conn_mgr: Reorganize files 2023-05-11 12:15:44 +02:00
hostname.c includes: prefer <zephyr/kernel.h> over <zephyr/zephyr.h> 2022-09-05 16:31:47 +02:00
Kconfig net: conn_mgr: Reorganize files 2023-05-11 12:15:44 +02:00
Kconfig.hostname
Kconfig.template.log_config.default.net
Kconfig.template.log_config.net