|  | .. _vulnerabilities: | 
|  |  | 
|  | Vulnerabilities | 
|  | ############### | 
|  |  | 
|  | This page collects all of the vulnerabilities that are discovered and | 
|  | fixed in each release.  It will also often have more details than is | 
|  | available in the releases.  Some vulnerabilities are deemed to be | 
|  | sensitive, and will not be publically discussed until there is | 
|  | sufficient time to fix them.  Because the release notes are locked to | 
|  | a version, the information here can be updated after the embargo is | 
|  | lifted. | 
|  |  | 
|  | CVE-2017 | 
|  | ======== | 
|  |  | 
|  | CVE-2017-14199 | 
|  | -------------- | 
|  |  | 
|  | Buffer overflow in :code:`getaddrinfo()`. | 
|  |  | 
|  | - `CVE-2017-14199 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14199>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-12 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_ | 
|  |  | 
|  | - `PR6158 fix for 1.11.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_ | 
|  |  | 
|  | CVE-2017-14201 | 
|  | -------------- | 
|  |  | 
|  | The shell DNS command can cause unpredictable results due to misuse of | 
|  | stack variables. | 
|  |  | 
|  | Use After Free vulnerability in the Zephyr shell allows a serial or | 
|  | telnet connected user to cause denial of service, and possibly remote | 
|  | code execution. | 
|  |  | 
|  | This has been fixed in release v1.14.0. | 
|  |  | 
|  | - `CVE-2017-14201 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14201>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-17 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17>`_ | 
|  |  | 
|  | - `PR13260 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/13260>`_ | 
|  |  | 
|  | CVE-2017-14202 | 
|  | -------------- | 
|  |  | 
|  | The shell implementation does not protect against buffer overruns | 
|  | resulting in unpredicable behavior. | 
|  |  | 
|  | Improper Restriction of Operations within the Bounds of a Memory | 
|  | Buffer vulnerability in the shell component of Zephyr allows a serial | 
|  | or telnet connected user to cause a crash, possibly with arbitrary | 
|  | code execution. | 
|  |  | 
|  | This has been fixed in release v1.14.0. | 
|  |  | 
|  | - `CVE-2017-14202 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14202>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-18 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18>`_ | 
|  |  | 
|  | - `PR13048 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/13048>`_ | 
|  |  | 
|  | CVE-2019 | 
|  | ======== | 
|  |  | 
|  | CVE-2019-9506 | 
|  | ------------- | 
|  |  | 
|  | The Bluetooth BR/EDR specification up to and including version 5.1 | 
|  | permits sufficiently low encryption key length and does not prevent an | 
|  | attacker from influencing the key length negotiation. This allows | 
|  | practical brute-force attacks (aka "KNOB") that can decrypt traffic | 
|  | and inject arbitrary ciphertext without the victim noticing. | 
|  |  | 
|  | - `CVE-2019-9506 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-20 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-20>`_ | 
|  |  | 
|  | - `PR18702 fix for v1.14.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/18702>`_ | 
|  |  | 
|  | - `PR18659 fix for v2.0.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/18659>`_ | 
|  |  | 
|  | CVE-2020 | 
|  | ======== | 
|  |  | 
|  | CVE-2020-10019 | 
|  | -------------- | 
|  |  | 
|  | Buffer Overflow vulnerability in USB DFU of zephyr allows a USB | 
|  | connected host to cause possible remote code execution. | 
|  |  | 
|  | This has been fixed in releases v1.14.2, v2.2.0, and v2.1.1. | 
|  |  | 
|  | - `CVE-2020-10019 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10019>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-25 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25>`_ | 
|  |  | 
|  | - `PR23460 fix for 1.14.x | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23460>`_ | 
|  |  | 
|  | - `PR23457 fix for 2.1.x | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23457>`_ | 
|  |  | 
|  | - `PR23190 fix in 2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23190>`_ | 
|  |  | 
|  | CVE-2020-10021 | 
|  | -------------- | 
|  |  | 
|  | Out-of-bounds write in USB Mass Storage with unaligned sizes | 
|  |  | 
|  | Out-of-bounds Write in the USB Mass Storage memoryWrite handler with | 
|  | unaligned Sizes. | 
|  |  | 
|  | See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10021 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10021>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-26 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26>`_ | 
|  |  | 
|  | - `PR23455 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23455>`_ | 
|  |  | 
|  | - `PR23456 fix for the v2.1 branch | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23456>`_ | 
|  |  | 
|  | - `PR23240 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23240>`_ | 
|  |  | 
|  | CVE-2020-10022 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array | 
|  |  | 
|  | A malformed JSON payload that is received from an UpdateHub server may | 
|  | trigger memory corruption in the Zephyr OS. This could result in a | 
|  | denial of service in the best case, or code execution in the worst | 
|  | case. | 
|  |  | 
|  | See NCC-ZEP-016 | 
|  |  | 
|  | This has been fixed in the below pull requests for master, branch from | 
|  | v2.1.0, and branch from v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10022 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10022>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-28 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28>`_ | 
|  |  | 
|  | - `PR24154 fix for master | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24154>`_ | 
|  |  | 
|  | - `PR24065 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24065>`_ | 
|  |  | 
|  | - `PR24066 fix for branch from v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24066>`_ | 
|  |  | 
|  | CVE-2020-10023 | 
|  | -------------- | 
|  |  | 
|  | Shell Subsystem Contains a Buffer Overflow Vulnerability In | 
|  | shell_spaces_trim | 
|  |  | 
|  | The shell subsystem contains a buffer overflow, whereby an adversary | 
|  | with physical access to the device is able to cause a memory | 
|  | corruption, resulting in denial of service or possibly code execution | 
|  | within the Zephyr kernel. | 
|  |  | 
|  | See NCC-ZEP-019 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, v2.2.0, and in a branch from | 
|  | v2.1.0, | 
|  |  | 
|  | - `CVE-2020-10023 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10023>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-29 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29>`_ | 
|  |  | 
|  | - `PR23646 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23646>`_ | 
|  |  | 
|  | - `PR23649 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23649>`_ | 
|  |  | 
|  | - `PR23304 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23304>`_ | 
|  |  | 
|  | CVE-2020-10024 | 
|  | -------------- | 
|  |  | 
|  | ARM Platform Uses Signed Integer Comparison When Validating Syscall | 
|  | Numbers | 
|  |  | 
|  | The arm platform-specific code uses a signed integer comparison when | 
|  | validating system call numbers. An attacker who has obtained code | 
|  | execution within a user thread is able to elevate privileges to that | 
|  | of the kernel. | 
|  |  | 
|  | See NCC-ZEP-001 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0, | 
|  |  | 
|  | - `CVE-2020-10024 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10024>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-30 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30>`_ | 
|  |  | 
|  | - `PR23535 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23535>`_ | 
|  |  | 
|  | - `PR23498 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23498>`_ | 
|  |  | 
|  | - `PR23323 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23323>`_ | 
|  |  | 
|  | CVE-2020-10027 | 
|  | -------------- | 
|  |  | 
|  | ARC Platform Uses Signed Integer Comparison When Validating Syscall | 
|  | Numbers | 
|  |  | 
|  | An attacker who has obtained code execution within a user thread is | 
|  | able to elevate privileges to that of the kernel. | 
|  |  | 
|  | See NCC-ZEP-001 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0. | 
|  |  | 
|  | - `CVE-2020-10027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10027>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-35 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35>`_ | 
|  |  | 
|  | - `PR23500 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23500>`_ | 
|  |  | 
|  | - `PR23499 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23499>`_ | 
|  |  | 
|  | - `PR23328 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23328>`_ | 
|  |  | 
|  | CVE-2020-10028 | 
|  | -------------- | 
|  |  | 
|  | Multiple Syscalls In GPIO Subsystem Performs No Argument Validation | 
|  |  | 
|  | Multiple syscalls with insufficient argument validation | 
|  |  | 
|  | See NCC-ZEP-006 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0, and in a branch | 
|  | from v2.1.0. | 
|  |  | 
|  | - `CVE-2020-10028 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10028>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-32 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32>`_ | 
|  |  | 
|  | - `PR23733 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23733>`_ | 
|  |  | 
|  | - `PR23737 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23737>`_ | 
|  |  | 
|  | - `PR23308 fix for v2.2.0 (gpio patch) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ | 
|  |  | 
|  | CVE-2020-10058 | 
|  | -------------- | 
|  |  | 
|  | Multiple Syscalls In kscan Subsystem Performs No Argument Validation | 
|  |  | 
|  | Multiple syscalls in the Kscan subsystem perform insufficient argument | 
|  | validation, allowing code executing in userspace to potentially gain | 
|  | elevated privileges. | 
|  |  | 
|  | See NCC-ZEP-006 | 
|  |  | 
|  | This has been fixed in a branch from v2.1.0, and release v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10058 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10058>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-34 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34>`_ | 
|  |  | 
|  | - `PR23748 fix for branch from v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23748>`_ | 
|  |  | 
|  | - `PR23308 fix for v2.2.0 (kscan patch) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ | 
|  |  | 
|  | CVE-2020-10059 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Module Explicitly Disables TLS Verification | 
|  |  | 
|  | The UpdateHub module disables DTLS peer checking, which allows for a | 
|  | man in the middle attack. This is mitigated by firmware images | 
|  | requiring valid signatures. However, there is no benefit to using DTLS | 
|  | without the peer checking. | 
|  |  | 
|  | See NCC-ZEP-018 | 
|  |  | 
|  | This has been fixed in a PR against Zephyr master. | 
|  |  | 
|  | - `CVE-2020-10059 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10059>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-36 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36>`_ | 
|  |  | 
|  | - `PR24954 fix on master (to be fixed in v2.3.0) | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24954>`_ | 
|  |  | 
|  | - `PR24954 fix v2.1.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24999>`_ | 
|  |  | 
|  | - `PR24954 fix v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/24997>`_ | 
|  |  | 
|  | CVE-2020-10060 | 
|  | -------------- | 
|  |  | 
|  | UpdateHub Might Dereference An Uninitialized Pointer | 
|  |  | 
|  | In updatehub_probe, right after JSON parsing is complete, objects\[1] | 
|  | is accessed from the output structure in two different places. If the | 
|  | JSON contained less than two elements, this access would reference | 
|  | unitialized stack memory. This could result in a crash, denial of | 
|  | service, or possibly an information leak. | 
|  |  | 
|  | Recommend disabling updatehub until such a time as a fix can be made | 
|  | available. | 
|  |  | 
|  | See NCC-ZEP-030 | 
|  |  | 
|  | This issue has not been fixed. | 
|  |  | 
|  | - `CVE-2020-10060 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10060>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-37 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_ | 
|  |  | 
|  | CVE-2020-10062 | 
|  | -------------- | 
|  |  | 
|  | Under embargo until 2020/05/25 | 
|  |  | 
|  | CVE-2020-10063 | 
|  | -------------- | 
|  |  | 
|  | Under embargo until 2020/05/25 | 
|  |  | 
|  | CVE-2020-10067 | 
|  | -------------- | 
|  |  | 
|  | Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory | 
|  |  | 
|  | A malicious userspace application can cause a integer overflow and | 
|  | bypass security checks performed by system call handlers. The impact | 
|  | would depend on the underlying system call and can range from denial | 
|  | of service to information leak to memory corruption resulting in code | 
|  | execution within the kernel. | 
|  |  | 
|  | See NCC-ZEP-005 | 
|  |  | 
|  | This has been fixed in releases v1.14.2, and v2.2.0. | 
|  |  | 
|  | - `CVE-2020-10067 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10067>`_ | 
|  |  | 
|  | - `Zephyr project bug tracker ZEPSEC-27 | 
|  | <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27>`_ | 
|  |  | 
|  | - `PR23653 fix for v1.14.2 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23653>`_ | 
|  |  | 
|  | - `PR23654 fix for the v2.1 branch | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23654>`_ | 
|  |  | 
|  | - `PR23239 fix for v2.2.0 | 
|  | <https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_ |