This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Zephyrproject First view 2022-02-07
Product Zephyr Last view 2025-02-25
Version 3.0.0 Type Os
Update rc2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:zephyrproject:zephyr

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
9.1 2025-02-25 CVE-2025-1675

The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data.

8.2 2025-02-25 CVE-2025-1674

A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.

8.2 2025-02-25 CVE-2025-1673

A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.

6.5 2024-12-16 CVE-2024-8798

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

8.4 2024-11-15 CVE-2024-11263

When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.

6.5 2024-10-04 CVE-2024-6444

No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.

6.5 2024-10-04 CVE-2024-6443

In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty.

6.5 2024-10-04 CVE-2024-6442

In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow.

6.5 2024-09-13 CVE-2024-6259

BT: HCI: adv_ext_report Improper discarding in adv_ext_report

6.5 2024-09-13 CVE-2024-6258

BT: Missing length checks of net_buf in rfcomm_handle_data

6.5 2024-09-13 CVE-2024-6137

BT: Classic: SDP OOB access in get_att_search_list

6.5 2024-09-13 CVE-2024-6135

BT:Classic: Multiple missing buf length checks

6.5 2024-09-13 CVE-2024-5931

BT: Unchecked user input in bap_broadcast_assistant

6.5 2024-09-13 CVE-2024-5754

BT: Encryption procedure host vulnerability

6.5 2024-08-19 CVE-2024-4785

BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero

6.5 2024-07-03 CVE-2024-3332

A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device

6.5 2024-03-29 CVE-2024-3077

An malicious BLE device can crash BLE victim device by sending malformed gatt packet

7.5 2024-03-15 CVE-2023-7060

Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address.

9.8 2024-02-29 CVE-2023-6881

Possible buffer overflow in is_mount_point

9.1 2024-02-19 CVE-2024-1638

The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.

9.8 2024-02-18 CVE-2023-6749

Unchecked length coming from user input in settings shell

9.8 2024-02-18 CVE-2023-6249

Signed to unsigned conversion esp32_ipm_send

9.8 2024-02-18 CVE-2023-5779

can: out of bounds in remove_rx_filter function

9.8 2023-11-21 CVE-2023-5055

Possible variant of CVE-2021-3434 in function le_ecred_reconf_req.

8.8 2023-11-21 CVE-2023-4424

An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device.

CWE : Common Weakness Enumeration

%idName
37% (16) CWE-787 Out-of-bounds Write
23% (10) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
6% (3) CWE-476 NULL Pointer Dereference
4% (2) CWE-369 Divide By Zero
4% (2) CWE-191 Integer Underflow (Wrap or Wraparound)
4% (2) CWE-125 Out-of-bounds Read
2% (1) CWE-704 Incorrect Type Conversion or Cast
2% (1) CWE-681 Incorrect Conversion between Numeric Types
2% (1) CWE-665 Improper Initialization
2% (1) CWE-416 Use After Free
2% (1) CWE-415 Double Free
2% (1) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (1) CWE-193 Off-by-one Error
2% (1) CWE-131 Incorrect Calculation of Buffer Size