Filtered by vendor Zephyrproject
Subscribe
Total
105 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-4424 | 1 Zephyrproject | 1 Zephyr | 2023-11-29 | N/A | 8.8 HIGH |
An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device. | |||||
CVE-2023-5563 | 1 Zephyrproject | 1 Zephyr | 2023-10-18 | N/A | 7.5 HIGH |
The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception. | |||||
CVE-2023-2234 | 1 Zephyrproject | 1 Zephyr | 2023-08-28 | N/A | 8.8 HIGH |
Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host. | |||||
CVE-2022-0553 | 1 Zephyrproject | 1 Zephyr | 2023-07-21 | N/A | 4.6 MEDIUM |
There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily. | |||||
CVE-2023-0359 | 1 Zephyrproject | 1 Zephyr | 2023-07-13 | N/A | 7.5 HIGH |
A missing nullptr-check in handle_ra_input can cause a nullptr-deref. | |||||
CVE-2021-3454 | 1 Zephyrproject | 1 Zephyr | 2023-07-07 | 5.0 MEDIUM | 7.5 HIGH |
Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3 | |||||
CVE-2021-3581 | 1 Zephyrproject | 1 Zephyr | 2023-06-26 | 5.8 MEDIUM | 8.8 HIGH |
Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5 | |||||
CVE-2021-3433 | 1 Zephyrproject | 1 Zephyr | 2023-06-26 | 2.1 LOW | 3.3 LOW |
Invalid channel map in CONNECT_IND results to Deadlock. Zephyr versions >= v2.5.0 Improper Check or Handling of Exceptional Conditions (CWE-703). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp | |||||
CVE-2023-0779 | 1 Zephyrproject | 1 Zephyr | 2023-06-06 | N/A | 7.7 HIGH |
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible. | |||||
CVE-2021-3329 | 1 Zephyrproject | 1 Zephyr | 2023-03-07 | N/A | 6.5 MEDIUM |
Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack | |||||
CVE-2021-3322 | 1 Zephyrproject | 1 Zephyr | 2023-02-06 | 3.3 LOW | 6.5 MEDIUM |
Unexpected Pointer Aliasing in IEEE 802154 Fragment Reassembly in Zephyr. Zephyr versions >= >=2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p86r-gc4r-4mq3 | |||||
CVE-2023-0397 | 1 Zephyrproject | 1 Zephyr | 2023-01-25 | N/A | 6.5 MEDIUM |
A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete. | |||||
CVE-2021-3966 | 1 Zephyrproject | 1 Zephyr | 2023-01-18 | N/A | 8.8 HIGH |
usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem. | |||||
CVE-2022-2741 | 1 Zephyrproject | 1 Zephyr | 2022-11-01 | N/A | 7.5 HIGH |
The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa). | |||||
CVE-2020-10065 | 1 Zephyrproject | 1 Zephyr | 2022-10-29 | 5.8 MEDIUM | 8.8 HIGH |
Missing Size Checks in Bluetooth HCI over SPI. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Length Parameter Inconsistency (CWE-130). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hg2w-62p6-g67c | |||||
CVE-2021-3319 | 1 Zephyrproject | 1 Zephyr | 2022-10-25 | 7.5 HIGH | 9.8 CRITICAL |
DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364 | |||||
CVE-2022-1841 | 1 Zephyrproject | 1 Zephyr | 2022-09-07 | N/A | 5.3 MEDIUM |
In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero. | |||||
CVE-2022-1042 | 1 Zephyrproject | 1 Zephyr | 2022-08-03 | N/A | 8.8 HIGH |
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning. | |||||
CVE-2022-1041 | 1 Zephyrproject | 1 Zephyr | 2022-08-02 | N/A | 8.8 HIGH |
In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning. | |||||
CVE-2021-3435 | 1 Zephyrproject | 1 Zephyr | 2022-07-08 | 2.1 LOW | 3.3 LOW |
Information leakage in le_ecred_conn_req(). Zephyr versions >= v2.4.0 Use of Uninitialized Resource (CWE-908). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh |