|  | .. _vulnerabilities: | 
|  |  | 
|  | Vulnerabilities | 
|  | ############### | 
|  |  | 
|  | This page collects all of the vulnerabilities that are discovered and | 
|  | fixed in each release.  It will also often have more details than is | 
|  | available in the releases.  Some vulnerabilities are deemed to be | 
|  | sensitive, and will not be publicly discussed until there is | 
|  | sufficient time to fix them.  Because the release notes are locked to | 
|  | a version, the information here can be updated after the embargo is | 
|  | lifted. | 
|  |  | 
|  | CVE-2017 | 
|  | ======== | 
|  |  | 
|  | CVE-2017-14199 | 
|  | -------------- | 
|  |  | 
|  | Buffer overflow in :code:`getaddrinfo()`. | 
|  |  | 
|  | - `CVE-2017-14199 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14199>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-12 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_ | 
|  |  | 
|  | - `PR6158 fix for 1.11.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_ | 
|  |  | 
|  | CVE-2017-14201 | 
|  | -------------- | 
|  |  | 
|  | The shell DNS command can cause unpredictable results due to misuse of | 
|  | stack variables. | 
|  |  | 
|  | Use After Free vulnerability in the Zephyr shell allows a serial or | 
|  | telnet connected user to cause denial of service, and possibly remote | 
|  | code execution. | 
|  |  | 
|  | This has been fixed in release v1.14.0. | 
|  |  | 
|  | - `CVE-2017-14201 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14201>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-17 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17>`_ | 
|  |  | 
|  | - `PR13260 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/13260>`_ | 
|  |  | 
|  | CVE-2017-14202 | 
|  | -------------- | 
|  |  | 
|  | The shell implementation does not protect against buffer overruns | 
|  | resulting in unpredictable behavior. | 
|  |  | 
|  | Improper Restriction of Operations within the Bounds of a Memory | 
|  | Buffer vulnerability in the shell component of Zephyr allows a serial | 
|  | or telnet connected user to cause a crash, possibly with arbitrary | 
|  | code execution. | 
|  |  | 
|  | This has been fixed in release v1.14.0. | 
|  |  | 
|  | - `CVE-2017-14202 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14202>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-18 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18>`_ | 
|  |  | 
|  | - `PR13048 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/13048>`_ | 
|  |  | 
|  | CVE-2019 | 
|  | ======== | 
|  |  | 
|  | CVE-2019-9506 | 
|  | ------------- | 
|  |  | 
|  | The Bluetooth BR/EDR specification up to and including version 5.1 | 
|  | permits sufficiently low encryption key length and does not prevent an | 
|  | attacker from influencing the key length negotiation. This allows | 
|  | practical brute-force attacks (aka "KNOB") that can decrypt traffic | 
|  | and inject arbitrary ciphertext without the victim noticing. | 
|  |  | 
|  | - `CVE-2019-9506 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-20 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-20>`_ | 
|  |  | 
|  | - `PR18702 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/18702>`_ | 
|  |  | 
|  | - `PR18659 fix for v2.0.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/18659>`_ | 
|  |  | 
|  | CVE-2020 | 
|  | ======== | 
|  |  | 
|  | CVE-2020-10019 | 
|  | -------------- | 
|  |  | 
|  | Buffer Overflow vulnerability in USB DFU of zephyr allows a USB | 
|  | connected host to cause possible remote code execution. | 
|  |  | 
|  | This has been fixed in releases v1.14.2, v2.2.0, and v2.1.1. | 
|  |  | 
|  | - `CVE-2020-10019 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10019>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-25 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25>`_ | 
|  |  | 
|  | - `PR23460 fix for 1.14.x | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23460>`_ | 
|  |  | 
|  | - `PR23457 fix for 2.1.x | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23457>`_ | 
|  |  | 
|  | - `PR23190 fix in 2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23190>`_ | 
|  |  | 
|  | CVE-2020-10021 | 
|  | -------------- | 
|  |  | 
|  | Out-of-bounds write in USB Mass Storage with unaligned sizes | 
|  |  | 
|  | Out-of-bounds Write in the USB Mass Storage memoryWrite handler with | 
|  | unaligned Sizes. | 
|  |  | 
|  | See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10021 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10021>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-26 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26>`_ | 
|  |  | 
|  | - `PR23455 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23455>`_ | 
|  |  | 
|  | - `PR23456 fix for the v2.1 branch | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23456>`_ | 
|  |  | 
|  | - `PR23240 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23240>`_ | 
|  |  | 
|  | CVE-2020-10022 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array | 
|  |  | 
|  | A malformed JSON payload that is received from an UpdateHub server may | 
|  | trigger memory corruption in the Zephyr OS. This could result in a | 
|  | denial of service in the best case, or code execution in the worst | 
|  | case. | 
|  |  | 
|  | See NCC-ZEP-016 | 
|  |  | 
|  | This has been fixed in the below pull requests for main, branch from | 
|  | v2.1.0, and branch from v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10022 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10022>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-28 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28>`_ | 
|  |  | 
|  | - `PR24154 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24154>`_ | 
|  |  | 
|  | - `PR24065 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24065>`_ | 
|  |  | 
|  | - `PR24066 fix for branch from v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24066>`_ | 
|  |  | 
|  | CVE-2020-10023 | 
|  | -------------- | 
|  |  | 
|  | Shell Subsystem Contains a Buffer Overflow Vulnerability In | 
|  | shell_spaces_trim | 
|  |  | 
|  | The shell subsystem contains a buffer overflow, whereby an adversary | 
|  | with physical access to the device is able to cause a memory | 
|  | corruption, resulting in denial of service or possibly code execution | 
|  | within the Zephyr kernel. | 
|  |  | 
|  | See NCC-ZEP-019 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, v2.2.0, and in a branch from | 
|  | v2.1.0, | 
|  |  | 
|  | - `CVE-2020-10023 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10023>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-29 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29>`_ | 
|  |  | 
|  | - `PR23646 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23646>`_ | 
|  |  | 
|  | - `PR23649 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23649>`_ | 
|  |  | 
|  | - `PR23304 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23304>`_ | 
|  |  | 
|  | CVE-2020-10024 | 
|  | -------------- | 
|  |  | 
|  | ARM Platform Uses Signed Integer Comparison When Validating Syscall | 
|  | Numbers | 
|  |  | 
|  | The arm platform-specific code uses a signed integer comparison when | 
|  | validating system call numbers. An attacker who has obtained code | 
|  | execution within a user thread is able to elevate privileges to that | 
|  | of the kernel. | 
|  |  | 
|  | See NCC-ZEP-001 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0, | 
|  |  | 
|  | - `CVE-2020-10024 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10024>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-30 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30>`_ | 
|  |  | 
|  | - `PR23535 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23535>`_ | 
|  |  | 
|  | - `PR23498 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23498>`_ | 
|  |  | 
|  | - `PR23323 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23323>`_ | 
|  |  | 
|  | CVE-2020-10027 | 
|  | -------------- | 
|  |  | 
|  | ARC Platform Uses Signed Integer Comparison When Validating Syscall | 
|  | Numbers | 
|  |  | 
|  | An attacker who has obtained code execution within a user thread is | 
|  | able to elevate privileges to that of the kernel. | 
|  |  | 
|  | See NCC-ZEP-001 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0. | 
|  |  | 
|  | - `CVE-2020-10027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10027>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-35 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35>`_ | 
|  |  | 
|  | - `PR23500 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23500>`_ | 
|  |  | 
|  | - `PR23499 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23499>`_ | 
|  |  | 
|  | - `PR23328 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23328>`_ | 
|  |  | 
|  | CVE-2020-10028 | 
|  | -------------- | 
|  |  | 
|  | Multiple Syscalls In GPIO Subsystem Performs No Argument Validation | 
|  |  | 
|  | Multiple syscalls with insufficient argument validation | 
|  |  | 
|  | See NCC-ZEP-006 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0. | 
|  |  | 
|  | - `CVE-2020-10028 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10028>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-32 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32>`_ | 
|  |  | 
|  | - `PR23733 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23733>`_ | 
|  |  | 
|  | - `PR23737 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23737>`_ | 
|  |  | 
|  | - `PR23308 fix for v2.2.0 (gpio patch) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ | 
|  |  | 
|  | CVE-2020-10058 | 
|  | -------------- | 
|  |  | 
|  | Multiple Syscalls In kscan Subsystem Performs No Argument Validation | 
|  |  | 
|  | Multiple syscalls in the Kscan subsystem perform insufficient argument | 
|  | validation, allowing code executing in userspace to potentially gain | 
|  | elevated privileges. | 
|  |  | 
|  | See NCC-ZEP-006 | 
|  |  | 
|  | This has been fixed in a branch from v2.1.0, and release v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10058 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10058>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-34 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34>`_ | 
|  |  | 
|  | - `PR23748 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23748>`_ | 
|  |  | 
|  | - `PR23308 fix for v2.2.0 (kscan patch) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ | 
|  |  | 
|  | CVE-2020-10059 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Module Explicitly Disables TLS Verification | 
|  |  | 
|  | The UpdateHub module disables DTLS peer checking, which allows for a | 
|  | man in the middle attack. This is mitigated by firmware images | 
|  | requiring valid signatures. However, there is no benefit to using DTLS | 
|  | without the peer checking. | 
|  |  | 
|  | See NCC-ZEP-018 | 
|  |  | 
|  | This has been fixed in a PR against Zephyr main. | 
|  |  | 
|  | - `CVE-2020-10059 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10059>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-36 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36>`_ | 
|  |  | 
|  | - `PR24954 fix on main (to be fixed in v2.3.0) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24954>`_ | 
|  |  | 
|  | - `PR24954 fix v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24999>`_ | 
|  |  | 
|  | - `PR24954 fix v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24997>`_ | 
|  |  | 
|  | CVE-2020-10060 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Might Dereference An Uninitialized Pointer | 
|  |  | 
|  | In updatehub_probe, right after JSON parsing is complete, objects\[1] | 
|  | is accessed from the output structure in two different places. If the | 
|  | JSON contained less than two elements, this access would reference | 
|  | unitialized stack memory. This could result in a crash, denial of | 
|  | service, or possibly an information leak. | 
|  |  | 
|  | Recommend disabling updatehub until such a time as a fix can be made | 
|  | available. | 
|  |  | 
|  | See NCC-ZEP-030 | 
|  |  | 
|  | This has been fixed in a PR against Zephyr main. | 
|  |  | 
|  | - `CVE-2020-10060 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10060>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-37 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_ | 
|  |  | 
|  | - `PR27865 fix on main (to be fixed in v2.4.0) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27865>`_ | 
|  |  | 
|  | - `PR27865 fix for v2.3.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27889>`_ | 
|  |  | 
|  | - `PR27865 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27891>`_ | 
|  |  | 
|  | - `PR27865 fix for v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27893>`_ | 
|  |  | 
|  | CVE-2020-10061 | 
|  | -------------- | 
|  |  | 
|  | Error handling invalid packet sequence | 
|  |  | 
|  | Improper handling of the full-buffer case in the Zephyr Bluetooth | 
|  | implementation can result in memory corruption. | 
|  |  | 
|  | This has been fixed in branches for v1.14.0, v2.2.0, and will be | 
|  | included in v2.3.0. | 
|  |  | 
|  | - `CVE-2020-10061 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10061>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-75 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75>`_ | 
|  |  | 
|  | - `PR23516 fix for v2.3 (split driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23516>`_ | 
|  |  | 
|  | - `PR23517 fix for v2.3 (legacy driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23517>`_ | 
|  |  | 
|  | - `PR23091 fix for branch from v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ | 
|  |  | 
|  | - `PR23547 fix for branch from v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23547>`_ | 
|  |  | 
|  | CVE-2020-10062 | 
|  | -------------- | 
|  |  | 
|  | Packet length decoding error in MQTT | 
|  |  | 
|  | CVE: An off-by-one error in the Zephyr project MQTT packet length | 
|  | decoder can result in memory corruption and possible remote code | 
|  | execution. NCC-ZEP-031 | 
|  |  | 
|  | The MQTT packet header length can be 1 to 4 bytes. An off-by-one error | 
|  | in the code can result in this being interpreted as 5 bytes, which can | 
|  | cause an integer overflow, resulting in memory corruption. | 
|  |  | 
|  | This has been fixed in main for v2.3. | 
|  |  | 
|  | - `CVE-2020-10062 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10062>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-84 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84>`_ | 
|  |  | 
|  | - `commit 11b7a37d for v2.3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4>`_ | 
|  |  | 
|  | - `NCC-ZEP report`_ (NCC-ZEP-031) | 
|  |  | 
|  | .. _NCC-ZEP report: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment | 
|  |  | 
|  | CVE-2020-10063 | 
|  | -------------- | 
|  |  | 
|  | Remote Denial of Service in CoAP Option Parsing Due To Integer | 
|  | Overflow | 
|  |  | 
|  | A remote adversary with the ability to send arbitrary CoAP packets to | 
|  | be parsed by Zephyr is able to cause a denial of service. | 
|  |  | 
|  | This has been fixed in main for v2.3. | 
|  |  | 
|  | - `CVE-2020-10063 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10063>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-55 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55>`_ | 
|  |  | 
|  | - `PR24435 fix in main for v2.3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24435>`_ | 
|  |  | 
|  | - `PR24531 fix for branch from v2.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24531>`_ | 
|  |  | 
|  | - `PR24535 fix for branch from v2.1 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24535>`_ | 
|  |  | 
|  | - `PR24530 fix for branch from v1.14 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24530>`_ | 
|  |  | 
|  | - `NCC-ZEP report`_ (NCC-ZEP-032) | 
|  |  | 
|  | CVE-2020-10064 | 
|  | -------------- | 
|  |  | 
|  | Improper Input Frame Validation in ieee802154 Processing | 
|  |  | 
|  | - `CVE-2020-10064 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10064>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-65 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-65>`_ | 
|  |  | 
|  | - `PR24971 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24971>`_ | 
|  |  | 
|  | - `PR33451 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33451>`_ | 
|  |  | 
|  | CVE-2020-10065 | 
|  | -------------- | 
|  |  | 
|  | OOB Write after not validating user-supplied length (<= 0xffff) and | 
|  | copying to fixed-size buffer (default: 77 bytes) for HCI_ACL packets in | 
|  | bluetooth HCI over SPI driver. | 
|  |  | 
|  | - `CVE-2020-10065 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10065>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-66 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-66>`_ | 
|  |  | 
|  | - This issue has not been fixed. | 
|  |  | 
|  | CVE-2020-10066 | 
|  | -------------- | 
|  |  | 
|  | Incorrect Error Handling in Bluetooth HCI core | 
|  |  | 
|  | In hci_cmd_done, the buf argument being passed as null causes | 
|  | nullpointer dereference. | 
|  |  | 
|  | - `CVE-2020-10066 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10066>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-67 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-67>`_ | 
|  |  | 
|  | - `PR24902 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24902>`_ | 
|  |  | 
|  | - `PR25089 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/25089>`_ | 
|  |  | 
|  | CVE-2020-10067 | 
|  | -------------- | 
|  |  | 
|  | Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory | 
|  |  | 
|  | A malicious userspace application can cause a integer overflow and | 
|  | bypass security checks performed by system call handlers. The impact | 
|  | would depend on the underlying system call and can range from denial | 
|  | of service to information leak to memory corruption resulting in code | 
|  | execution within the kernel. | 
|  |  | 
|  | See NCC-ZEP-005 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10067 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10067>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-27 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27>`_ | 
|  |  | 
|  | - `PR23653 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23653>`_ | 
|  |  | 
|  | - `PR23654 fix for the v2.1 branch | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23654>`_ | 
|  |  | 
|  | - `PR23239 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_ | 
|  |  | 
|  | CVE-2020-10068 | 
|  | -------------- | 
|  |  | 
|  | Zephyr Bluetooth DLE duplicate requests vulnerability | 
|  |  | 
|  | In the Zephyr project Bluetooth subsystem, certain duplicate and | 
|  | back-to-back packets can cause incorrect behavior, resulting in a | 
|  | denial of service. | 
|  |  | 
|  | This has been fixed in branches for v1.14.0, v2.2.0, and will be | 
|  | included in v2.3.0. | 
|  |  | 
|  | - `CVE-2020-10068 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10068>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-78 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78>`_ | 
|  |  | 
|  | - `PR23707 fix for v2.3 (split driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23707>`_ | 
|  |  | 
|  | - `PR23708 fix for v2.3 (legacy driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23708>`_ | 
|  |  | 
|  | - `PR23091 fix for branch from v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ | 
|  |  | 
|  | - `PR23964 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23964>`_ | 
|  |  | 
|  | CVE-2020-10069 | 
|  | -------------- | 
|  |  | 
|  | Zephyr Bluetooth unchecked packet data results in denial of service | 
|  |  | 
|  | An unchecked parameter in bluetooth data can result in an assertion | 
|  | failure, or division by zero, resulting in a denial of service attack. | 
|  |  | 
|  | This has been fixed in branches for v1.14.0, v2.2.0, and will be | 
|  | included in v2.3.0. | 
|  |  | 
|  | - `CVE-2020-10069 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10069>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-81 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81>`_ | 
|  |  | 
|  | - `PR23705 fix for v2.3 (split driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23705>`_ | 
|  |  | 
|  | - `PR23706 fix for v2.3 (legacy driver) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23706>`_ | 
|  |  | 
|  | - `PR23091 fix for branch from v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ | 
|  |  | 
|  | - `PR23963 fix for branch from v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23963>`_ | 
|  |  | 
|  | CVE-2020-10070 | 
|  | -------------- | 
|  |  | 
|  | MQTT buffer overflow on receive buffer | 
|  |  | 
|  | In the Zephyr Project MQTT code, improper bounds checking can result | 
|  | in memory corruption and possibly remote code execution.  NCC-ZEP-031 | 
|  |  | 
|  | When calculating the packet length, arithmetic overflow can result in | 
|  | accepting a receive buffer larger than the available buffer space, | 
|  | resulting in user data being written beyond this buffer. | 
|  |  | 
|  | This has been fixed in main for v2.3. | 
|  |  | 
|  | - `CVE-2020-10070 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10070>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-85 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85>`_ | 
|  |  | 
|  | - `commit 0b39cbf3 for v2.3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542>`_ | 
|  |  | 
|  | - `NCC-ZEP report`_ (NCC-ZEP-031) | 
|  |  | 
|  | CVE-2020-10071 | 
|  | -------------- | 
|  |  | 
|  | Insufficient publish message length validation in MQTT | 
|  |  | 
|  | The Zephyr MQTT parsing code performs insufficient checking of the | 
|  | length field on publish messages, allowing a buffer overflow and | 
|  | potentially remote code execution. NCC-ZEP-031 | 
|  |  | 
|  | This has been fixed in main for v2.3. | 
|  |  | 
|  | - `CVE-2020-10071 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10071>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-86 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86>`_ | 
|  |  | 
|  | - `commit 989c4713 fix for v2.3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082>`_ | 
|  |  | 
|  | - `NCC-ZEP report`_ (NCC-ZEP-031) | 
|  |  | 
|  | CVE-2020-10072 | 
|  | -------------- | 
|  |  | 
|  | All threads can access all socket file descriptors | 
|  |  | 
|  | There is no management of permissions to network socket API file | 
|  | descriptors. Any thread running on the system may read/write a socket | 
|  | file descriptor knowing only the numerical value of the file | 
|  | descriptor. | 
|  |  | 
|  | - `CVE-2020-10072 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10072>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-87 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-87>`_ | 
|  |  | 
|  | - `PR25804 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/25804>`_ | 
|  |  | 
|  | - `PR27176 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27176>`_ | 
|  |  | 
|  | CVE-2020-10136 | 
|  | ------------------- | 
|  |  | 
|  | IP-in-IP protocol routes arbitrary traffic by default zephyrproject | 
|  |  | 
|  | - `CVE-2020-10136 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10136>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-64 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-64>`_ | 
|  |  | 
|  | CVE-2020-13598 | 
|  | -------------- | 
|  |  | 
|  | FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat | 
|  |  | 
|  | Performing fs_stat on a file with a filename longer than 12 | 
|  | characters long will cause a buffer overflow. | 
|  |  | 
|  | - `CVE-2020-13598 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13598>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-88 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-88>`_ | 
|  |  | 
|  | - `PR25852 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/25852>`_ | 
|  |  | 
|  | - `PR28782 fix for v2.3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/28782>`_ | 
|  |  | 
|  | - `PR33577 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33577>`_ | 
|  |  | 
|  | CVE-2020-13599 | 
|  | -------------- | 
|  |  | 
|  | Security problem with settings and littlefs | 
|  |  | 
|  | When settings is used in combination with littlefs all security | 
|  | related information can be extracted from the device using MCUmgr and | 
|  | this could be used e.g in bt-mesh to get the device key, network key, | 
|  | app keys from the device. | 
|  |  | 
|  | - `CVE-2020-13599 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13599>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-57 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-57>`_ | 
|  |  | 
|  | - `PR26083 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/26083>`_ | 
|  |  | 
|  | CVE-2020-13600 | 
|  | ------------------- | 
|  |  | 
|  | Malformed SPI in response for eswifi can corrupt kernel memory | 
|  |  | 
|  |  | 
|  | - `CVE-2020-13600 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13600>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-91 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-91>`_ | 
|  |  | 
|  | - `PR26712 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/26712>`_ | 
|  |  | 
|  | CVE-2020-13601 | 
|  | -------------- | 
|  |  | 
|  | Possible read out of bounds in dns read | 
|  |  | 
|  | - `CVE-2020-13601 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13601>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-92 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-92>`_ | 
|  |  | 
|  | - `PR27774 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/27774>`_ | 
|  |  | 
|  | - `PR30503 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/30503>`_ | 
|  |  | 
|  | CVE-2020-13602 | 
|  | -------------- | 
|  |  | 
|  | Remote Denial of Service in LwM2M do_write_op_tlv | 
|  |  | 
|  | In the Zephyr LwM2M implementation, malformed input can result in an | 
|  | infinite loop, resulting in a denial of service attack. | 
|  |  | 
|  | - `CVE-2020-13602 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13602>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-56 | 
|  | <https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-56>`_ | 
|  |  | 
|  | - `PR26571 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ | 
|  |  | 
|  | - `PR33578 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33578>`_ | 
|  |  | 
|  | CVE-2020-13603 | 
|  | -------------- | 
|  |  | 
|  | Possible overflow in mempool | 
|  |  | 
|  | * Zephyr offers pre-built 'malloc' wrapper function instead. | 
|  | * The 'malloc' function is wrapper for the 'sys_mem_pool_alloc' function | 
|  | * sys_mem_pool_alloc allocates 'size + WB_UP(sizeof(struct sys_mem_pool_block))' in an unsafe manner. | 
|  | * Asking for very large size values leads to internal integer wrap-around. | 
|  | * Integer wrap-around leads to successful allocation of very small memory. | 
|  | * For example: calling malloc(0xffffffff) leads to successful allocation of 7 bytes. | 
|  | * That leads to heap overflow. | 
|  |  | 
|  | - `CVE-2020-13603 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13603>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-111 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-111>`_ | 
|  |  | 
|  | - `PR31796 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/31796>`_ | 
|  |  | 
|  | - `PR32808 fix for v1.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ | 
|  |  | 
|  | CVE-2021 | 
|  | ======== | 
|  |  | 
|  | CVE-2021-3319 | 
|  | ------------- | 
|  |  | 
|  | DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses | 
|  |  | 
|  | Improper processing of omitted source and destination addresses in | 
|  | ieee802154 frame validation (ieee802154_validate_frame) | 
|  |  | 
|  | This has been fixed in main for v2.5.0 | 
|  |  | 
|  | - `CVE-2020-3319 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3319>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-94jg-2p6q-5364 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364>`_ | 
|  |  | 
|  | - `PR31908 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ | 
|  |  | 
|  | CVE-2021-3320 | 
|  | ------------------- | 
|  | Mismatch between validation and handling of 802154 ACK frames, where | 
|  | ACK frames are considered during validation, but not during actual | 
|  | processing, leading to a type confusion. | 
|  |  | 
|  | - `CVE-2020-3320 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3320>`_ | 
|  |  | 
|  | - `PR31908 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ | 
|  |  | 
|  | CVE-2021-3321 | 
|  | ------------- | 
|  |  | 
|  | Incomplete check of minimum IEEE 802154 fragment size leading to an | 
|  | integer underflow. | 
|  |  | 
|  | - `CVE-2020-3321 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3321>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-114 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-114>`_ | 
|  |  | 
|  | - `PR33453 fix for v2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33453>`_ | 
|  |  | 
|  | CVE-2021-3323 | 
|  | ------------- | 
|  |  | 
|  | Integer Underflow in 6LoWPAN IPHC Header Uncompression | 
|  |  | 
|  | - `CVE-2020-3323 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3323>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-116 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-116>`_ | 
|  |  | 
|  | - This issue has not been fixed. | 
|  |  | 
|  | CVE-2021-3430 | 
|  | ------------- | 
|  |  | 
|  | Assertion reachable with repeated LL_CONNECTION_PARAM_REQ. | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3430 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3430>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-46h3-hjcq-2jjr | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr>`_ | 
|  |  | 
|  | - `PR 33272 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33272>`_ | 
|  |  | 
|  | - `PR 33369 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ | 
|  |  | 
|  | - `PR 33759 fix for 1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33759>`_ | 
|  |  | 
|  | CVE-2021-3431 | 
|  | ------------- | 
|  |  | 
|  | BT: Assertion failure on repeated LL_FEATURE_REQ | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3431 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3431>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-7548-5m6f-mqv9 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9>`_ | 
|  |  | 
|  | - `PR 33340 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33340>`_ | 
|  |  | 
|  | - `PR 33369 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ | 
|  |  | 
|  | CVE-2021-3432 | 
|  | ------------- | 
|  |  | 
|  | Invalid interval in CONNECT_IND leads to Division by Zero | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3432 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3432>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-7364-p4wc-8mj4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4>`_ | 
|  |  | 
|  | - `PR 33278 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ | 
|  |  | 
|  | - `PR 33369 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ | 
|  |  | 
|  | CVE-2021-3433 | 
|  | ------------- | 
|  |  | 
|  | BT: Invalid channel map in CONNECT_IND results to Deadlock | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3433 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3433>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-3c2f-w4v6-qxrp | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp>`_ | 
|  |  | 
|  | - `PR 33278 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ | 
|  |  | 
|  | - `PR 33369 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ | 
|  |  | 
|  | CVE-2021-3434 | 
|  | ------------- | 
|  |  | 
|  | L2CAP: Stack based buffer overflow in le_ecred_conn_req() | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3434 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3434>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-8w87-6rfp-cfrm | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm>`_ | 
|  |  | 
|  | - `PR 33305 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ | 
|  |  | 
|  | - `PR 33419 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ | 
|  |  | 
|  | - `PR 33418 fix for 1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ | 
|  |  | 
|  | CVE-2021-3435 | 
|  | ------------- | 
|  |  | 
|  | L2CAP: Information leakage in le_ecred_conn_req() | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3435 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3435>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-xhg3-gvj6-4rqh | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh>`_ | 
|  |  | 
|  | - `PR 33305 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ | 
|  |  | 
|  | - `PR 33419 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ | 
|  |  | 
|  | - `PR 33418 fix for 1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ | 
|  |  | 
|  | CVE-2021-3436 | 
|  | ------------- | 
|  |  | 
|  | Bluetooth: Possible to overwrite an existing bond during keys | 
|  | distribution phase when the identity address of the bond is known | 
|  |  | 
|  | During the distribution of the identity address information we don’t | 
|  | check for an existing bond with the same identity address.This means | 
|  | that a duplicate entry will be created in RAM while the newest entry | 
|  | will overwrite the existing one in persistent storage. | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3436 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3436>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-j76f-35mc-4h63 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63>`_ | 
|  |  | 
|  | - `PR 33266 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33266>`_ | 
|  |  | 
|  | - `PR 33432 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33432>`_ | 
|  |  | 
|  | - `PR 33433 fix for 2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33433>`_ | 
|  |  | 
|  | - `PR 33718 fix for 1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33718>`_ | 
|  |  | 
|  | CVE-2021-3454 | 
|  | ------------- | 
|  |  | 
|  | Truncated L2CAP K-frame causes assertion failure | 
|  |  | 
|  | For example, sending L2CAP K-frame where SDU length field is truncated | 
|  | to only one byte, causes assertion failure in previous releases of | 
|  | Zephyr. This has been fixed in master by commit 0ba9437 but has not | 
|  | yet been backported to older release branches. | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3454 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3454>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-fx88-6c29-vrp3 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3>`_ | 
|  |  | 
|  | - `PR 32588 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/32588>`_ | 
|  |  | 
|  | - `PR 33513 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33513>`_ | 
|  |  | 
|  | - `PR 33514 fix for 2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/33514>`_ | 
|  |  | 
|  | CVE-2021-3455 | 
|  | ------------- | 
|  |  | 
|  | Disconnecting L2CAP channel right after invalid ATT request leads freeze | 
|  |  | 
|  | When Central device connects to peripheral and creates L2CAP | 
|  | connection for Enhanced ATT, sending some invalid ATT request and | 
|  | disconnecting immediately causes freeze. | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3455 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3455>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-7g38-3x9v-v7vp | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp>`_ | 
|  |  | 
|  | - `PR 35597 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/35597>`_ | 
|  |  | 
|  | - `PR 36104 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/36104>`_ | 
|  |  | 
|  | - `PR 36105 fix for 2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/36105>`_ | 
|  |  | 
|  | CVE-2021-3510 | 
|  | ------------- | 
|  |  | 
|  | Zephyr JSON decoder incorrectly decodes array of array | 
|  |  | 
|  | When using JSON_OBJ_DESCR_ARRAY_ARRAY, the subarray is has the token | 
|  | type JSON_TOK_LIST_START, but then assigns to the object part of the | 
|  | union. arr_parse then takes the offset of the array-object (which has | 
|  | nothing todo with the list) treats it as relative to the parent | 
|  | object, and stores the length of the subarray in there. | 
|  |  | 
|  | This has been fixed in main for v2.7.0 | 
|  |  | 
|  | - `CVE-2021-3510 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3510>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-289f-7mw3-2qf4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4>`_ | 
|  |  | 
|  | - `PR 36340 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/36340>`_ | 
|  |  | 
|  | - `PR 37816 fix for 2.6 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/37816>`_ | 
|  |  | 
|  | CVE-2021-3581 | 
|  | ------------- | 
|  |  | 
|  | HCI data not properly checked leads to memory overflow in the Bluetooth stack | 
|  |  | 
|  | In the process of setting SCAN_RSP through the HCI command, the Zephyr | 
|  | Bluetooth protocol stack did not effectively check the length of the | 
|  | incoming HCI data. Causes memory overflow, and then the data in the | 
|  | memory is overwritten, and may even cause arbitrary code execution. | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3581 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3581>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-8q65-5gqf-fmw5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5>`_ | 
|  |  | 
|  | - `PR 35935 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/35935>`_ | 
|  |  | 
|  | - `PR 35984 fix for 2.5 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/35984>`_ | 
|  |  | 
|  | - `PR 35985 fix for 2.4 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ | 
|  |  | 
|  | - `PR 35985 fix for 1.14 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ | 
|  |  | 
|  | CVE-2021-3625 | 
|  | ------------- | 
|  |  | 
|  | Buffer overflow in Zephyr USB DFU DNLOAD | 
|  |  | 
|  | This has been fixed in main for v2.6.0 | 
|  |  | 
|  | - `CVE-2021-3625 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3625>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker GHSA-c3gr-hgvr-f363 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363>`_ | 
|  |  | 
|  | - `PR 36694 fix for main | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/36694>`_ |