Summary
Detail | |||
---|---|---|---|
Vendor | Zephyrproject | First view | 2022-02-07 |
Product | Zephyr | Last view | 2025-02-25 |
Version | 3.0.0 | Type | Os |
Update | rc2 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:zephyrproject:zephyr |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.1 | 2025-02-25 | CVE-2025-1675 | The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data. |
8.2 | 2025-02-25 | CVE-2025-1674 | A lack of input validation allows for out of bounds reads caused by malicious or malformed packets. |
8.2 | 2025-02-25 | CVE-2025-1673 | A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation. |
6.5 | 2024-12-16 | CVE-2024-8798 | No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c. |
8.4 | 2024-11-15 | CVE-2024-11263 | When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols. |
6.5 | 2024-10-04 | CVE-2024-6444 | No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c. |
6.5 | 2024-10-04 | CVE-2024-6443 | In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty. |
6.5 | 2024-10-04 | CVE-2024-6442 | In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow. |
6.5 | 2024-09-13 | CVE-2024-6259 | BT: HCI: adv_ext_report Improper discarding in adv_ext_report |
6.5 | 2024-09-13 | CVE-2024-6258 | BT: Missing length checks of net_buf in rfcomm_handle_data |
6.5 | 2024-09-13 | CVE-2024-6137 | BT: Classic: SDP OOB access in get_att_search_list |
6.5 | 2024-09-13 | CVE-2024-6135 | BT:Classic: Multiple missing buf length checks |
6.5 | 2024-09-13 | CVE-2024-5931 | BT: Unchecked user input in bap_broadcast_assistant |
6.5 | 2024-09-13 | CVE-2024-5754 | BT: Encryption procedure host vulnerability |
6.5 | 2024-08-19 | CVE-2024-4785 | BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero |
6.5 | 2024-07-03 | CVE-2024-3332 | A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device |
6.5 | 2024-03-29 | CVE-2024-3077 | An malicious BLE device can crash BLE victim device by sending malformed gatt packet |
7.5 | 2024-03-15 | CVE-2023-7060 | Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address. |
9.8 | 2024-02-29 | CVE-2023-6881 | Possible buffer overflow in is_mount_point |
9.1 | 2024-02-19 | CVE-2024-1638 | The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read. |
9.8 | 2024-02-18 | CVE-2023-6749 | Unchecked length coming from user input in settings shell |
9.8 | 2024-02-18 | CVE-2023-6249 | Signed to unsigned conversion esp32_ipm_send |
9.8 | 2024-02-18 | CVE-2023-5779 | can: out of bounds in remove_rx_filter function |
9.8 | 2023-11-21 | CVE-2023-5055 | Possible variant of CVE-2021-3434 in function le_ecred_reconf_req. |
8.8 | 2023-11-21 | CVE-2023-4424 | An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
37% (16) | CWE-787 | Out-of-bounds Write |
23% (10) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
6% (3) | CWE-476 | NULL Pointer Dereference |
4% (2) | CWE-369 | Divide By Zero |
4% (2) | CWE-191 | Integer Underflow (Wrap or Wraparound) |
4% (2) | CWE-125 | Out-of-bounds Read |
2% (1) | CWE-704 | Incorrect Type Conversion or Cast |
2% (1) | CWE-681 | Incorrect Conversion between Numeric Types |
2% (1) | CWE-665 | Improper Initialization |
2% (1) | CWE-416 | Use After Free |
2% (1) | CWE-415 | Double Free |
2% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (1) | CWE-193 | Off-by-one Error |
2% (1) | CWE-131 | Incorrect Calculation of Buffer Size |