| .. _vulnerabilities: |
| |
| Vulnerabilities |
| ############### |
| |
| This page collects all of the vulnerabilities that are discovered and |
| fixed in each release. It will also often have more details than is |
| available in the releases. Some vulnerabilities are deemed to be |
| sensitive, and will not be publicly discussed until there is |
| sufficient time to fix them. Because the release notes are locked to |
| a version, the information here can be updated after the embargo is |
| lifted. |
| |
| CVE-2017 |
| ======== |
| |
| :cve:`2017-14199` |
| ----------------- |
| |
| Buffer overflow in :code:`getaddrinfo()`. |
| |
| - `Zephyr project bug tracker ZEPSEC-12 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_ |
| |
| - `PR6158 fix for 1.11.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_ |
| |
| :cve:`2017-14201` |
| ----------------- |
| |
| The shell DNS command can cause unpredictable results due to misuse of |
| stack variables. |
| |
| Use After Free vulnerability in the Zephyr shell allows a serial or |
| telnet connected user to cause denial of service, and possibly remote |
| code execution. |
| |
| This has been fixed in release v1.14.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-17 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17>`_ |
| |
| - `PR13260 fix for v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/13260>`_ |
| |
| :cve:`2017-14202` |
| ----------------- |
| |
| The shell implementation does not protect against buffer overruns |
| resulting in unpredictable behavior. |
| |
| Improper Restriction of Operations within the Bounds of a Memory |
| Buffer vulnerability in the shell component of Zephyr allows a serial |
| or telnet connected user to cause a crash, possibly with arbitrary |
| code execution. |
| |
| This has been fixed in release v1.14.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-18 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18>`_ |
| |
| - `PR13048 fix for v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/13048>`_ |
| |
| CVE-2019 |
| ======== |
| |
| :cve:`2019-9506` |
| ---------------- |
| |
| The Bluetooth BR/EDR specification up to and including version 5.1 |
| permits sufficiently low encryption key length and does not prevent an |
| attacker from influencing the key length negotiation. This allows |
| practical brute-force attacks (aka "KNOB") that can decrypt traffic |
| and inject arbitrary ciphertext without the victim noticing. |
| |
| - `Zephyr project bug tracker ZEPSEC-20 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-20>`_ |
| |
| - `PR18702 fix for v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/18702>`_ |
| |
| - `PR18659 fix for v2.0.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/18659>`_ |
| |
| CVE-2020 |
| ======== |
| |
| :cve:`2020-10019` |
| ----------------- |
| |
| Buffer Overflow vulnerability in USB DFU of zephyr allows a USB |
| connected host to cause possible remote code execution. |
| |
| This has been fixed in releases v1.14.2, v2.2.0, and v2.1.1. |
| |
| - `Zephyr project bug tracker ZEPSEC-25 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25>`_ |
| |
| - `PR23460 fix for 1.14.x |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23460>`_ |
| |
| - `PR23457 fix for 2.1.x |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23457>`_ |
| |
| - `PR23190 fix in 2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23190>`_ |
| |
| :cve:`2020-10021` |
| ----------------- |
| |
| Out-of-bounds write in USB Mass Storage with unaligned sizes |
| |
| Out-of-bounds Write in the USB Mass Storage memoryWrite handler with |
| unaligned Sizes. |
| |
| See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 |
| |
| This has been fixed in releases v1.14.2, and v2.2.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-26 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26>`_ |
| |
| - `PR23455 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23455>`_ |
| |
| - `PR23456 fix for the v2.1 branch |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23456>`_ |
| |
| - `PR23240 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23240>`_ |
| |
| :cve:`2020-10022` |
| ----------------- |
| |
| UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array |
| |
| A malformed JSON payload that is received from an UpdateHub server may |
| trigger memory corruption in the Zephyr OS. This could result in a |
| denial of service in the best case, or code execution in the worst |
| case. |
| |
| See NCC-ZEP-016 |
| |
| This has been fixed in the below pull requests for main, branch from |
| v2.1.0, and branch from v2.2.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-28 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28>`_ |
| |
| - `PR24154 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24154>`_ |
| |
| - `PR24065 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24065>`_ |
| |
| - `PR24066 fix for branch from v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24066>`_ |
| |
| :cve:`2020-10023` |
| ----------------- |
| |
| Shell Subsystem Contains a Buffer Overflow Vulnerability In |
| shell_spaces_trim |
| |
| The shell subsystem contains a buffer overflow, whereby an adversary |
| with physical access to the device is able to cause a memory |
| corruption, resulting in denial of service or possibly code execution |
| within the Zephyr kernel. |
| |
| See NCC-ZEP-019 |
| |
| This has been fixed in releases v1.14.2, v2.2.0, and in a branch from |
| v2.1.0, |
| |
| - `Zephyr project bug tracker ZEPSEC-29 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29>`_ |
| |
| - `PR23646 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23646>`_ |
| |
| - `PR23649 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23649>`_ |
| |
| - `PR23304 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23304>`_ |
| |
| :cve:`2020-10024` |
| ----------------- |
| |
| ARM Platform Uses Signed Integer Comparison When Validating Syscall |
| Numbers |
| |
| The arm platform-specific code uses a signed integer comparison when |
| validating system call numbers. An attacker who has obtained code |
| execution within a user thread is able to elevate privileges to that |
| of the kernel. |
| |
| See NCC-ZEP-001 |
| |
| This has been fixed in releases v1.14.2, and v2.2.0, and in a branch |
| from v2.1.0, |
| |
| - `Zephyr project bug tracker ZEPSEC-30 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30>`_ |
| |
| - `PR23535 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23535>`_ |
| |
| - `PR23498 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23498>`_ |
| |
| - `PR23323 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23323>`_ |
| |
| :cve:`2020-10027` |
| ----------------- |
| |
| ARC Platform Uses Signed Integer Comparison When Validating Syscall |
| Numbers |
| |
| An attacker who has obtained code execution within a user thread is |
| able to elevate privileges to that of the kernel. |
| |
| See NCC-ZEP-001 |
| |
| This has been fixed in releases v1.14.2, and v2.2.0, and in a branch |
| from v2.1.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-35 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35>`_ |
| |
| - `PR23500 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23500>`_ |
| |
| - `PR23499 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23499>`_ |
| |
| - `PR23328 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23328>`_ |
| |
| :cve:`2020-10028` |
| ----------------- |
| |
| Multiple Syscalls In GPIO Subsystem Performs No Argument Validation |
| |
| Multiple syscalls with insufficient argument validation |
| |
| See NCC-ZEP-006 |
| |
| This has been fixed in releases v1.14.2, and v2.2.0, and in a branch |
| from v2.1.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-32 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32>`_ |
| |
| - `PR23733 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23733>`_ |
| |
| - `PR23737 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23737>`_ |
| |
| - `PR23308 fix for v2.2.0 (gpio patch) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ |
| |
| :cve:`2020-10058` |
| ----------------- |
| |
| Multiple Syscalls In kscan Subsystem Performs No Argument Validation |
| |
| Multiple syscalls in the Kscan subsystem perform insufficient argument |
| validation, allowing code executing in userspace to potentially gain |
| elevated privileges. |
| |
| See NCC-ZEP-006 |
| |
| This has been fixed in a branch from v2.1.0, and release v2.2.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-34 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34>`_ |
| |
| - `PR23748 fix for branch from v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23748>`_ |
| |
| - `PR23308 fix for v2.2.0 (kscan patch) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ |
| |
| :cve:`2020-10059` |
| ----------------- |
| |
| UpdateHub Module Explicitly Disables TLS Verification |
| |
| The UpdateHub module disables DTLS peer checking, which allows for a |
| man in the middle attack. This is mitigated by firmware images |
| requiring valid signatures. However, there is no benefit to using DTLS |
| without the peer checking. |
| |
| See NCC-ZEP-018 |
| |
| This has been fixed in a PR against Zephyr main. |
| |
| - `Zephyr project bug tracker ZEPSEC-36 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36>`_ |
| |
| - `PR24954 fix on main (to be fixed in v2.3.0) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24954>`_ |
| |
| - `PR24954 fix v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24999>`_ |
| |
| - `PR24954 fix v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24997>`_ |
| |
| :cve:`2020-10060` |
| ----------------- |
| |
| UpdateHub Might Dereference An Uninitialized Pointer |
| |
| In updatehub_probe, right after JSON parsing is complete, objects\[1] |
| is accessed from the output structure in two different places. If the |
| JSON contained less than two elements, this access would reference |
| uninitialized stack memory. This could result in a crash, denial of |
| service, or possibly an information leak. |
| |
| Recommend disabling updatehub until such a time as a fix can be made |
| available. |
| |
| See NCC-ZEP-030 |
| |
| This has been fixed in a PR against Zephyr main. |
| |
| - `Zephyr project bug tracker ZEPSEC-37 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_ |
| |
| - `PR27865 fix on main (to be fixed in v2.4.0) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27865>`_ |
| |
| - `PR27865 fix for v2.3.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27889>`_ |
| |
| - `PR27865 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27891>`_ |
| |
| - `PR27865 fix for v2.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27893>`_ |
| |
| :cve:`2020-10061` |
| ----------------- |
| |
| Error handling invalid packet sequence |
| |
| Improper handling of the full-buffer case in the Zephyr Bluetooth |
| implementation can result in memory corruption. |
| |
| This has been fixed in branches for v1.14.0, v2.2.0, and will be |
| included in v2.3.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-75 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75>`_ |
| |
| - `PR23516 fix for v2.3 (split driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23516>`_ |
| |
| - `PR23517 fix for v2.3 (legacy driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23517>`_ |
| |
| - `PR23091 fix for branch from v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ |
| |
| - `PR23547 fix for branch from v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23547>`_ |
| |
| :cve:`2020-10062` |
| ----------------- |
| |
| Packet length decoding error in MQTT |
| |
| CVE: An off-by-one error in the Zephyr project MQTT packet length |
| decoder can result in memory corruption and possible remote code |
| execution. NCC-ZEP-031 |
| |
| The MQTT packet header length can be 1 to 4 bytes. An off-by-one error |
| in the code can result in this being interpreted as 5 bytes, which can |
| cause an integer overflow, resulting in memory corruption. |
| |
| This has been fixed in main for v2.3. |
| |
| - `Zephyr project bug tracker ZEPSEC-84 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84>`_ |
| |
| - `commit 11b7a37d for v2.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4>`_ |
| |
| - `NCC-ZEP report`_ (NCC-ZEP-031) |
| |
| .. _NCC-ZEP report: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment |
| |
| :cve:`2020-10063` |
| ----------------- |
| |
| Remote Denial of Service in CoAP Option Parsing Due To Integer |
| Overflow |
| |
| A remote adversary with the ability to send arbitrary CoAP packets to |
| be parsed by Zephyr is able to cause a denial of service. |
| |
| This has been fixed in main for v2.3. |
| |
| - `Zephyr project bug tracker ZEPSEC-55 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55>`_ |
| |
| - `PR24435 fix in main for v2.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24435>`_ |
| |
| - `PR24531 fix for branch from v2.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24531>`_ |
| |
| - `PR24535 fix for branch from v2.1 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24535>`_ |
| |
| - `PR24530 fix for branch from v1.14 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24530>`_ |
| |
| - `NCC-ZEP report`_ (NCC-ZEP-032) |
| |
| :cve:`2020-10064` |
| ----------------- |
| |
| Improper Input Frame Validation in ieee802154 Processing |
| |
| - `Zephyr project bug tracker ZEPSEC-65 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-65>`_ |
| |
| - `PR24971 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24971>`_ |
| |
| - `PR33451 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33451>`_ |
| |
| :cve:`2020-10065` |
| ----------------- |
| |
| OOB Write after not validating user-supplied length (<= 0xffff) and |
| copying to fixed-size buffer (default: 77 bytes) for HCI_ACL packets in |
| bluetooth HCI over SPI driver. |
| |
| - `Zephyr project bug tracker ZEPSEC-66 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-66>`_ |
| |
| - This issue has not been fixed. |
| |
| :cve:`2020-10066` |
| ----------------- |
| |
| Incorrect Error Handling in Bluetooth HCI core |
| |
| In hci_cmd_done, the buf argument being passed as null causes |
| nullpointer dereference. |
| |
| - `Zephyr project bug tracker ZEPSEC-67 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-67>`_ |
| |
| - `PR24902 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/24902>`_ |
| |
| - `PR25089 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/25089>`_ |
| |
| :cve:`2020-10067` |
| ----------------- |
| |
| Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory |
| |
| A malicious userspace application can cause a integer overflow and |
| bypass security checks performed by system call handlers. The impact |
| would depend on the underlying system call and can range from denial |
| of service to information leak to memory corruption resulting in code |
| execution within the kernel. |
| |
| See NCC-ZEP-005 |
| |
| This has been fixed in releases v1.14.2, and v2.2.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-27 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27>`_ |
| |
| - `PR23653 fix for v1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23653>`_ |
| |
| - `PR23654 fix for the v2.1 branch |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23654>`_ |
| |
| - `PR23239 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_ |
| |
| :cve:`2020-10068` |
| ----------------- |
| |
| Zephyr Bluetooth DLE duplicate requests vulnerability |
| |
| In the Zephyr project Bluetooth subsystem, certain duplicate and |
| back-to-back packets can cause incorrect behavior, resulting in a |
| denial of service. |
| |
| This has been fixed in branches for v1.14.0, v2.2.0, and will be |
| included in v2.3.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-78 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78>`_ |
| |
| - `PR23707 fix for v2.3 (split driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23707>`_ |
| |
| - `PR23708 fix for v2.3 (legacy driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23708>`_ |
| |
| - `PR23091 fix for branch from v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ |
| |
| - `PR23964 fix for v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23964>`_ |
| |
| :cve:`2020-10069` |
| ----------------- |
| |
| Zephyr Bluetooth unchecked packet data results in denial of service |
| |
| An unchecked parameter in bluetooth data can result in an assertion |
| failure, or division by zero, resulting in a denial of service attack. |
| |
| This has been fixed in branches for v1.14.0, v2.2.0, and will be |
| included in v2.3.0. |
| |
| - `Zephyr project bug tracker ZEPSEC-81 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81>`_ |
| |
| - `PR23705 fix for v2.3 (split driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23705>`_ |
| |
| - `PR23706 fix for v2.3 (legacy driver) |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23706>`_ |
| |
| - `PR23091 fix for branch from v1.14.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ |
| |
| - `PR23963 fix for branch from v2.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23963>`_ |
| |
| :cve:`2020-10070` |
| ----------------- |
| |
| MQTT buffer overflow on receive buffer |
| |
| In the Zephyr Project MQTT code, improper bounds checking can result |
| in memory corruption and possibly remote code execution. NCC-ZEP-031 |
| |
| When calculating the packet length, arithmetic overflow can result in |
| accepting a receive buffer larger than the available buffer space, |
| resulting in user data being written beyond this buffer. |
| |
| This has been fixed in main for v2.3. |
| |
| - `Zephyr project bug tracker ZEPSEC-85 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85>`_ |
| |
| - `commit 0b39cbf3 for v2.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542>`_ |
| |
| - `NCC-ZEP report`_ (NCC-ZEP-031) |
| |
| :cve:`2020-10071` |
| ----------------- |
| |
| Insufficient publish message length validation in MQTT |
| |
| The Zephyr MQTT parsing code performs insufficient checking of the |
| length field on publish messages, allowing a buffer overflow and |
| potentially remote code execution. NCC-ZEP-031 |
| |
| This has been fixed in main for v2.3. |
| |
| - `Zephyr project bug tracker ZEPSEC-86 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86>`_ |
| |
| - `commit 989c4713 fix for v2.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082>`_ |
| |
| - `NCC-ZEP report`_ (NCC-ZEP-031) |
| |
| :cve:`2020-10072` |
| ----------------- |
| |
| All threads can access all socket file descriptors |
| |
| There is no management of permissions to network socket API file |
| descriptors. Any thread running on the system may read/write a socket |
| file descriptor knowing only the numerical value of the file |
| descriptor. |
| |
| - `Zephyr project bug tracker ZEPSEC-87 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-87>`_ |
| |
| - `PR25804 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/25804>`_ |
| |
| - `PR27176 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27176>`_ |
| |
| :cve:`2020-10136` |
| ----------------- |
| |
| IP-in-IP protocol routes arbitrary traffic by default zephyrproject |
| |
| - `Zephyr project bug tracker ZEPSEC-64 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-64>`_ |
| |
| :cve:`2020-13598` |
| ----------------- |
| |
| FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat |
| |
| Performing fs_stat on a file with a filename longer than 12 |
| characters long will cause a buffer overflow. |
| |
| - `Zephyr project bug tracker ZEPSEC-88 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-88>`_ |
| |
| - `PR25852 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/25852>`_ |
| |
| - `PR28782 fix for v2.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/28782>`_ |
| |
| - `PR33577 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33577>`_ |
| |
| :cve:`2020-13599` |
| ----------------- |
| |
| Security problem with settings and littlefs |
| |
| When settings is used in combination with littlefs all security |
| related information can be extracted from the device using MCUmgr and |
| this could be used e.g in bt-mesh to get the device key, network key, |
| app keys from the device. |
| |
| - `Zephyr project bug tracker ZEPSEC-57 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-57>`_ |
| |
| - `PR26083 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/26083>`_ |
| |
| :cve:`2020-13600` |
| ----------------- |
| |
| Malformed SPI in response for eswifi can corrupt kernel memory |
| |
| |
| - `Zephyr project bug tracker ZEPSEC-91 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-91>`_ |
| |
| - `PR26712 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/26712>`_ |
| |
| :cve:`2020-13601` |
| ----------------- |
| |
| Possible read out of bounds in dns read |
| |
| - `Zephyr project bug tracker ZEPSEC-92 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-92>`_ |
| |
| - `PR27774 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/27774>`_ |
| |
| - `PR30503 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/30503>`_ |
| |
| :cve:`2020-13602` |
| ----------------- |
| |
| Remote Denial of Service in LwM2M do_write_op_tlv |
| |
| In the Zephyr LwM2M implementation, malformed input can result in an |
| infinite loop, resulting in a denial of service attack. |
| |
| - `Zephyr project bug tracker ZEPSEC-56 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-56>`_ |
| |
| - `PR26571 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ |
| |
| - `PR33578 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33578>`_ |
| |
| :cve:`2020-13603` |
| ----------------- |
| |
| Possible overflow in mempool |
| |
| * Zephyr offers pre-built 'malloc' wrapper function instead. |
| * The 'malloc' function is wrapper for the 'sys_mem_pool_alloc' function |
| * sys_mem_pool_alloc allocates 'size + WB_UP(sizeof(struct sys_mem_pool_block))' in an unsafe manner. |
| * Asking for very large size values leads to internal integer wrap-around. |
| * Integer wrap-around leads to successful allocation of very small memory. |
| * For example: calling malloc(0xffffffff) leads to successful allocation of 7 bytes. |
| * That leads to heap overflow. |
| |
| - `Zephyr project bug tracker ZEPSEC-111 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-111>`_ |
| |
| - `PR31796 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/31796>`_ |
| |
| - `PR32808 fix for v1.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ |
| |
| CVE-2021 |
| ======== |
| |
| :cve:`2021-3319` |
| ---------------- |
| |
| DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses |
| |
| Improper processing of omitted source and destination addresses in |
| ieee802154 frame validation (ieee802154_validate_frame) |
| |
| This has been fixed in main for v2.5.0 |
| |
| - `Zephyr project bug tracker GHSA-94jg-2p6q-5364 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364>`_ |
| |
| - `PR31908 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ |
| |
| :cve:`2021-3320` |
| ---------------- |
| Mismatch between validation and handling of 802154 ACK frames, where |
| ACK frames are considered during validation, but not during actual |
| processing, leading to a type confusion. |
| |
| - `PR31908 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ |
| |
| :cve:`2021-3321` |
| ---------------- |
| |
| Incomplete check of minimum IEEE 802154 fragment size leading to an |
| integer underflow. |
| |
| - `Zephyr project bug tracker ZEPSEC-114 |
| <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-114>`_ |
| |
| - `PR33453 fix for v2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33453>`_ |
| |
| :cve:`2021-3323` |
| ---------------- |
| |
| Integer Underflow in 6LoWPAN IPHC Header Uncompression |
| |
| This has been fixed in main for v2.5.0 |
| |
| - `Zephyr project bug tracker GHSA-89j6-qpxf-pfpc |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc>`_ |
| |
| - `PR 31971 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/31971>`_ |
| |
| :cve:`2021-3430` |
| ---------------- |
| |
| Assertion reachable with repeated LL_CONNECTION_PARAM_REQ. |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-46h3-hjcq-2jjr |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr>`_ |
| |
| - `PR 33272 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33272>`_ |
| |
| - `PR 33369 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ |
| |
| - `PR 33759 fix for 1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33759>`_ |
| |
| :cve:`2021-3431` |
| ---------------- |
| |
| BT: Assertion failure on repeated LL_FEATURE_REQ |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-7548-5m6f-mqv9 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9>`_ |
| |
| - `PR 33340 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33340>`_ |
| |
| - `PR 33369 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ |
| |
| :cve:`2021-3432` |
| ---------------- |
| |
| Invalid interval in CONNECT_IND leads to Division by Zero |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-7364-p4wc-8mj4 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4>`_ |
| |
| - `PR 33278 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ |
| |
| - `PR 33369 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ |
| |
| :cve:`2021-3433` |
| ---------------- |
| |
| BT: Invalid channel map in CONNECT_IND results to Deadlock |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-3c2f-w4v6-qxrp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp>`_ |
| |
| - `PR 33278 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ |
| |
| - `PR 33369 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ |
| |
| :cve:`2021-3434` |
| ---------------- |
| |
| L2CAP: Stack based buffer overflow in le_ecred_conn_req() |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-8w87-6rfp-cfrm |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm>`_ |
| |
| - `PR 33305 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ |
| |
| - `PR 33419 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ |
| |
| - `PR 33418 fix for 1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ |
| |
| :cve:`2021-3435` |
| ---------------- |
| |
| L2CAP: Information leakage in le_ecred_conn_req() |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-xhg3-gvj6-4rqh |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh>`_ |
| |
| - `PR 33305 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ |
| |
| - `PR 33419 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ |
| |
| - `PR 33418 fix for 1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ |
| |
| :cve:`2021-3436` |
| ---------------- |
| |
| Bluetooth: Possible to overwrite an existing bond during keys |
| distribution phase when the identity address of the bond is known |
| |
| During the distribution of the identity address information we don’t |
| check for an existing bond with the same identity address.This means |
| that a duplicate entry will be created in RAM while the newest entry |
| will overwrite the existing one in persistent storage. |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-j76f-35mc-4h63 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63>`_ |
| |
| - `PR 33266 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33266>`_ |
| |
| - `PR 33432 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33432>`_ |
| |
| - `PR 33433 fix for 2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33433>`_ |
| |
| - `PR 33718 fix for 1.14.2 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33718>`_ |
| |
| :cve:`2021-3454` |
| ---------------- |
| |
| Truncated L2CAP K-frame causes assertion failure |
| |
| For example, sending L2CAP K-frame where SDU length field is truncated |
| to only one byte, causes assertion failure in previous releases of |
| Zephyr. This has been fixed in master by commit 0ba9437 but has not |
| yet been backported to older release branches. |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-fx88-6c29-vrp3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3>`_ |
| |
| - `PR 32588 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/32588>`_ |
| |
| - `PR 33513 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33513>`_ |
| |
| - `PR 33514 fix for 2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/33514>`_ |
| |
| :cve:`2021-3455` |
| ---------------- |
| |
| Disconnecting L2CAP channel right after invalid ATT request leads freeze |
| |
| When Central device connects to peripheral and creates L2CAP |
| connection for Enhanced ATT, sending some invalid ATT request and |
| disconnecting immediately causes freeze. |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-7g38-3x9v-v7vp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp>`_ |
| |
| - `PR 35597 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/35597>`_ |
| |
| - `PR 36104 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/36104>`_ |
| |
| - `PR 36105 fix for 2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/36105>`_ |
| |
| :cve:`2021-3510` |
| ---------------- |
| |
| Zephyr JSON decoder incorrectly decodes array of array |
| |
| When using JSON_OBJ_DESCR_ARRAY_ARRAY, the subarray is has the token |
| type JSON_TOK_LIST_START, but then assigns to the object part of the |
| union. arr_parse then takes the offset of the array-object (which has |
| nothing todo with the list) treats it as relative to the parent |
| object, and stores the length of the subarray in there. |
| |
| This has been fixed in main for v2.7.0 |
| |
| - `Zephyr project bug tracker GHSA-289f-7mw3-2qf4 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4>`_ |
| |
| - `PR 36340 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/36340>`_ |
| |
| - `PR 37816 fix for 2.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/37816>`_ |
| |
| :cve:`2021-3581` |
| ---------------- |
| |
| HCI data not properly checked leads to memory overflow in the Bluetooth stack |
| |
| In the process of setting SCAN_RSP through the HCI command, the Zephyr |
| Bluetooth protocol stack did not effectively check the length of the |
| incoming HCI data. Causes memory overflow, and then the data in the |
| memory is overwritten, and may even cause arbitrary code execution. |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-8q65-5gqf-fmw5 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5>`_ |
| |
| - `PR 35935 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/35935>`_ |
| |
| - `PR 35984 fix for 2.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/35984>`_ |
| |
| - `PR 35985 fix for 2.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ |
| |
| - `PR 35985 fix for 1.14 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ |
| |
| :cve:`2021-3625` |
| ---------------- |
| |
| Buffer overflow in Zephyr USB DFU DNLOAD |
| |
| This has been fixed in main for v2.6.0 |
| |
| - `Zephyr project bug tracker GHSA-c3gr-hgvr-f363 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363>`_ |
| |
| - `PR 36694 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/36694>`_ |
| |
| :cve:`2021-3835` |
| ---------------- |
| |
| Buffer overflow in Zephyr USB device class |
| |
| This has been fixed in main for v3.0.0 |
| |
| - `Zephyr project bug tracker GHSA-fm6v-8625-99jf |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf>`_ |
| |
| - `PR 42093 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/42093>`_ |
| |
| - `PR 42167 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/42167>`_ |
| |
| :cve:`2021-3861` |
| ---------------- |
| |
| Buffer overflow in the RNDIS USB device class |
| |
| This has been fixed in main for v3.0.0 |
| |
| - `Zephyr project bug tracker GHSA-hvfp-w4h8-gxvj |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj>`_ |
| |
| - `PR 39725 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/39725>`_ |
| |
| :cve:`2021-3966` |
| ---------------- |
| |
| Usb bluetooth device ACL read cb buffer overflow |
| |
| This has been fixed in main for v3.0.0 |
| |
| - `Zephyr project bug tracker GHSA-hfxq-3w6x-fv2m |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfxq-3w6x-fv2m>`_ |
| |
| - `PR 42093 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/42093>`_ |
| |
| - `PR 42167 fix for v2.7.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/42167>`_ |
| |
| CVE-2022 |
| ======== |
| |
| :cve:`2022-0553` |
| ---------------- |
| |
| Possible to retrieve unencrypted firmware image |
| |
| This has been fixed in main for v3.0.0 |
| |
| - `Zephyr project bug tracker GHSA-wrj2-9vj9-rrcp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wrj2-9vj9-rrcp>`_ |
| |
| - `PR 42424 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/42424>`_ |
| |
| :cve:`2022-1041` |
| ---------------- |
| |
| Out-of-bound write vulnerability in the Bluetooth Mesh core stack can be triggered during provisioning |
| |
| This has been fixed in main for v3.1.0 |
| |
| - `Zephyr project bug tracker GHSA-p449-9hv9-pj38 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p449-9hv9-pj38>`_ |
| |
| - `PR 45136 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45136>`_ |
| |
| - `PR 45188 fix for v3.0.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45188>`_ |
| |
| - `PR 45187 fix for v2.7.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45187>`_ |
| |
| :cve:`2022-1042` |
| ---------------- |
| |
| Out-of-bound write vulnerability in the Bluetooth Mesh core stack can be triggered during provisioning |
| |
| This has been fixed in main for v3.1.0 |
| |
| - `Zephyr project bug tracker GHSA-j7v7-w73r-mm5x |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j7v7-w73r-mm5x>`_ |
| |
| - `PR 45066 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45066>`_ |
| |
| - `PR 45135 fix for v3.0.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45135>`_ |
| |
| - `PR 45134 fix for v2.7.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45134>`_ |
| |
| :cve:`2022-1841` |
| ---------------- |
| |
| Out-of-Bound Write in tcp_flags |
| |
| This has been fixed in main for v3.1.0 |
| |
| - `Zephyr project bug tracker GHSA-5c3j-p8cr-2pgh |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-5c3j-p8cr-2pgh>`_ |
| |
| - `PR 45796 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/45796>`_ |
| |
| :cve:`2022-2741` |
| ---------------- |
| |
| can: denial-of-service can be triggered by a crafted CAN frame |
| |
| This has been fixed in main for v3.2.0 |
| |
| - `Zephyr project bug tracker GHSA-hx5v-j59q-c3j8 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8>`_ |
| |
| - `PR 47903 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/47903>`_ |
| |
| - `PR 47957 fix for v3.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/47957>`_ |
| |
| - `PR 47958 fix for v3.0.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/47958>`_ |
| |
| - `PR 47959 fix for v2.7.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/47959>`_ |
| |
| :cve:`2022-2993` |
| ---------------- |
| |
| bt: host: Wrong key validation check |
| |
| This has been fixed in main for v3.2.0 |
| |
| - `Zephyr project bug tracker GHSA-3286-jgjx-8cvr |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3286-jgjx-8cvr>`_ |
| |
| - `PR 48733 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/48733>`_ |
| |
| :cve:`2022-3806` |
| ---------------- |
| |
| DoS: Invalid Initialization in le_read_buffer_size_complete() |
| |
| - `Zephyr project bug tracker GHSA-w525-fm68-ppq3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w525-fm68-ppq3>`_ |
| |
| CVE-2023 |
| ======== |
| |
| :cve:`2023-0396` |
| ---------------- |
| |
| Buffer Overreads in Bluetooth HCI |
| |
| - `Zephyr project bug tracker GHSA-8rpp-6vxq-pqg3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8rpp-6vxq-pqg3>`_ |
| |
| :cve:`2023-0397` |
| ---------------- |
| |
| DoS: Invalid Initialization in le_read_buffer_size_complete() |
| |
| - `Zephyr project bug tracker GHSA-wc2h-h868-q7hj |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wc2h-h868-q7hj>`_ |
| |
| This has been fixed in main for v3.3.0 |
| |
| - `PR 54905 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/54905>`_ |
| |
| - `PR 47957 fix for v3.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/55024>`_ |
| |
| - `PR 47958 fix for v3.1.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/55023>`_ |
| |
| - `PR 47959 fix for v2.7.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/55022>`_ |
| |
| :cve:`2023-0779` |
| ---------------- |
| |
| net: shell: Improper input validation |
| |
| - `Zephyr project bug tracker GHSA-9xj8-6989-r549 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549>`_ |
| |
| This has been fixed in main for v3.3.0 |
| |
| - `PR 54371 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/54371>`_ |
| |
| - `PR 54380 fix for v3.2.0 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/54380>`_ |
| |
| - `PR 54381 fix for v2.7.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/54381>`_ |
| |
| :cve:`2023-1901` |
| ---------------- |
| |
| HCI send_sync Dangling Semaphore Reference Re-use |
| |
| - `Zephyr project bug tracker GHSA-xvvm-8mcm-9cq3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xvvm-8mcm-9cq3>`_ |
| |
| This has been fixed in main for v3.4.0 |
| |
| - `PR 56709 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/56709>`_ |
| |
| :cve:`2023-1902` |
| ---------------- |
| |
| HCI Connection Creation Dangling State Reference Re-use |
| |
| - `Zephyr project bug tracker GHSA-fx9g-8fr2-q899 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899>`_ |
| |
| This has been fixed in main for v3.4.0 |
| |
| - `PR 56709 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/56709>`_ |
| |
| :cve:`2023-3725` |
| ---------------- |
| |
| Potential buffer overflow vulnerability in the Zephyr CANbus subsystem. |
| |
| - `Zephyr project bug tracker GHSA-2g3m-p6c7-8rr3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 61502 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61502>`_ |
| |
| - `PR 61518 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61518>`_ |
| |
| - `PR 61517 fix for 3.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61517>`_ |
| |
| - `PR 61516 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61516>`_ |
| |
| :cve:`2023-4257` |
| ---------------- |
| |
| Unchecked user input length in the Zephyr WiFi shell module can cause |
| buffer overflows. |
| |
| - `Zephyr project bug tracker GHSA-853q-q69w-gf5j |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 605377 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/605377>`_ |
| |
| - `PR 61383 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61383>`_ |
| |
| :cve:`2023-4258` |
| ---------------- |
| |
| bt: mesh: vulnerability in provisioning protocol implementation on provisionee side |
| |
| - `Zephyr project bug tracker GHSA-m34c-cp63-rwh7 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m34c-cp63-rwh7>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 59467 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/59467>`_ |
| |
| - `PR 60078 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/60078>`_ |
| |
| - `PR 60079 fix for 3.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/60079>`_ |
| |
| :cve:`2023-4259` |
| ---------------- |
| |
| Buffer overflow vulnerabilities in the Zephyr eS-WiFi driver |
| |
| - `Zephyr project bug tracker GHSA-gghm-c696-f4j4 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 63074 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63074>`_ |
| |
| - `PR 63750 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63750>`_ |
| |
| :cve:`2023-4260` |
| ---------------- |
| |
| Off-by-one buffer overflow vulnerability in the Zephyr FS subsystem |
| |
| - `Zephyr project bug tracker GHSA-gj27-862r-55wh |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 63079 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63079>`_ |
| |
| :cve:`2023-4262` |
| ---------------- |
| |
| - This issue has been determined to be a false positive after further analysis. |
| |
| :cve:`2023-4263` |
| ---------------- |
| |
| Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver. |
| |
| - `Zephyr project bug tracker GHSA-rf6q-rhhp-pqhf |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 60528 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/60528>`_ |
| |
| - `PR 61384 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61384>`_ |
| |
| - `PR 61216 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61216>`_ |
| |
| :cve:`2023-4264` |
| ---------------- |
| |
| Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem |
| |
| - `Zephyr project bug tracker GHSA-rgx6-3w4j-gf5j |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 58834 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/58834>`_ |
| |
| - `PR 60465 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/60465>`_ |
| |
| - `PR 61845 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61845>`_ |
| |
| - `PR 61385 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61385>`_ |
| |
| :cve:`2023-4265` |
| ---------------- |
| |
| Two potential buffer overflow vulnerabilities in Zephyr USB code |
| |
| - `Zephyr project bug tracker GHSA-4vgv-5r6q-r6xh |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh>`_ |
| |
| This has been fixed in main for v3.4.0 |
| |
| - `PR 59157 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/59157>`_ |
| - `PR 59018 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/59018>`_ |
| |
| :cve:`2023-4424` |
| ---------------- |
| |
| bt: hci: DoS and possible RCE |
| |
| - `Zephyr project bug tracker GHSA-j4qm-xgpf-qjw3 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j4qm-xgpf-qjw3>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 61651 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61651>`_ |
| |
| - `PR 61696 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61696>`_ |
| |
| - `PR 61695 fix for 3.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61695>`_ |
| |
| - `PR 61694 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61694>`_ |
| |
| |
| :cve:`2023-5055` |
| ---------------- |
| |
| L2CAP: Possible Stack based buffer overflow in le_ecred_reconf_req() |
| |
| - `Zephyr project bug tracker GHSA-wr8r-7f8x-24jj |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wr8r-7f8x-24jj>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 62381 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/62381>`_ |
| |
| |
| :cve:`2023-5139` |
| ---------------- |
| |
| Potential buffer overflow vulnerability in the Zephyr STM32 Crypto driver. |
| |
| - `Zephyr project bug tracker GHSA-rhrc-pcxp-4453 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 61839 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/61839>`_ |
| |
| :cve:`2023-5184` |
| ---------------- |
| |
| Potential signed to unsigned conversion errors and buffer overflow |
| vulnerabilities in the Zephyr IPM driver |
| |
| - `Zephyr project bug tracker GHSA-8x3p-q3r5-xh9g |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 63069 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63069>`_ |
| |
| :cve:`2023-5563` |
| ---------------- |
| |
| The SJA1000 CAN controller driver backend automatically attempts to recover |
| from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This |
| results in calling k_sleep() in IRQ context, causing a fatal exception. |
| |
| - `Zephyr project bug tracker GHSA-98mc-rj7w-7rpv |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 63713 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63713>`_ |
| |
| - `PR 63718 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63718>`_ |
| |
| - `PR 63717 fix for 3.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63717>`_ |
| |
| :cve:`2023-5753` |
| ---------------- |
| |
| Potential buffer overflow vulnerabilities in the Zephyr Bluetooth |
| subsystem source code when asserts are disabled. |
| |
| - `Zephyr project bug tracker GHSA-hmpr-px56-rvww |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww>`_ |
| |
| This has been fixed in main for v3.5.0 |
| |
| - `PR 63605 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/63605>`_ |
| |
| |
| :cve:`2023-5779` |
| ---------------- |
| |
| Out of bounds issue in remove_rx_filter in multiple can drivers. |
| |
| - `Zephyr project bug tracker GHSA-7cmj-963q-jj47 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 64399 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/64399>`_ |
| |
| - `PR 64416 fix for 3.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/64416>`_ |
| |
| - `PR 64415 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/64415>`_ |
| |
| - `PR 64427 fix for 3.3 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/64427>`_ |
| |
| - `PR 64431 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/64431>`_ |
| |
| :cve:`2023-6249` |
| ---------------- |
| |
| Signed to unsigned conversion problem in esp32_ipm_send may lead to buffer overflow |
| |
| - `Zephyr project bug tracker GHSA-32f5-3p9h-2rqc |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-32f5-3p9h-2rqc>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 65546 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/65546>`_ |
| |
| :cve:`2023-6749` |
| ---------------- |
| |
| Potential buffer overflow due unchecked data coming from user input in settings shell. |
| |
| - `Zephyr project bug tracker GHSA-757h-rw37-66hw |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 66451 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66451>`_ |
| |
| - `PR 66584 fix for 3.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66584>`_ |
| |
| :cve:`2023-6881` |
| ---------------- |
| |
| Potential buffer overflow vulnerability in Zephyr fuse file system. |
| |
| - `Zephyr project bug tracker GHSA-mh67-4h3q-p437 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 66592 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66592>`_ |
| |
| :cve:`2023-7060` |
| ---------------- |
| |
| Missing Security Control in Zephyr OS IP Packet Handling |
| |
| - `Zephyr project bug tracker GHSA-fjc8-223c-qgqr |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 66645 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66645>`_ |
| |
| - `PR 66739 fix for 3.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66739>`_ |
| |
| - `PR 66738 fix for 3.4 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66738>`_ |
| |
| - `PR 66887 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/66887>`_ |
| |
| CVE-2024 |
| ======== |
| |
| :cve:`2024-1638` |
| ---------------- |
| |
| Bluetooth characteristic LESC security requirement not enforced without additional flags |
| |
| - `Zephyr project bug tracker GHSA-p6f3-f63q-5mc2 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2>`_ |
| |
| This has been fixed in main for v3.6.0 |
| |
| - `PR 69170 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/69170>`_ |
| |
| :cve:`2024-3077` |
| ---------------- |
| |
| Bluetooth: Integer underflow in gatt_find_info_rsp. A malicious BLE |
| device can crash BLE victim device by sending malformed gatt packet. |
| |
| - `Zephyr project bug tracker GHSA-gmfv-4vfh-2mh8 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gmfv-4vfh-2mh8>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 69396 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/69396>`_ |
| |
| :cve:`2024-3332` |
| ---------------- |
| |
| Bluetooth: DoS caused by null pointer dereference. |
| |
| A malicious BLE device can send a specific order of packet |
| sequence to cause a DoS attack on the victim BLE device. |
| |
| - `Zephyr project bug tracker GHSA-jmr9-xw2v-5vf4 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jmr9-xw2v-5vf4>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 71030 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/71030>`_ |
| |
| |
| :cve:`2024-4785` |
| ---------------- |
| |
| Bluetooth: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero |
| |
| - `Zephyr project bug tracker GHSA-xcr5-5g98-mchp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 72608 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/72608>`_ |
| |
| :cve:`2024-5754` |
| ---------------- |
| |
| BT: Encryption procedure host vulnerability |
| |
| - `Zephyr project bug tracker GHSA-gvv5-66hw-5qrc |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 7395 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/7395>`_ |
| |
| - `PR 74124 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74124>`_ |
| |
| - `PR 74123 fix for 3.5 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74123>`_ |
| |
| - `PR 74122 fix for 2.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74122>`_ |
| |
| :cve:`2024-5931` |
| ---------------- |
| |
| BT: Unchecked user input in bap_broadcast_assistant |
| |
| - `Zephyr project bug tracker GHSA-r8h3-64gp-wv7f |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r8h3-64gp-wv7f>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74062 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74062>`_ |
| |
| - `PR 77966 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/77966>`_ |
| |
| |
| :cve:`2024-6135` |
| ---------------- |
| |
| BT:Classic: Multiple missing buf length checks |
| |
| - `Zephyr project bug tracker GHSA-2mp4-4g6f-cqcx |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2mp4-4g6f-cqcx>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74283 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74283>`_ |
| |
| - `PR 77964 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/77964>`_ |
| |
| :cve:`2024-6137` |
| ---------------- |
| |
| BT: Classic: SDP OOB access in get_att_search_list |
| |
| - `Zephyr project bug tracker GHSA-pm38-7g85-cf4f |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-pm38-7g85-cf4f>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 75575 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/75575>`_ |
| |
| :cve:`2024-6258` |
| ---------------- |
| |
| BT: Missing length checks of net_buf in rfcomm_handle_data |
| |
| - `Zephyr project bug tracker GHSA-7833-fcpm-3ggm |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7833-fcpm-3ggm>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74640 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74640>`_ |
| |
| :cve:`2024-6259` |
| ---------------- |
| |
| BT: HCI: adv_ext_report Improper discarding in adv_ext_report |
| |
| - `Zephyr project bug tracker GHSA-p5j7-v26w-wmcp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p5j7-v26w-wmcp>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74639 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74639>`_ |
| |
| - `PR 77960 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/77960>`_ |
| |
| :cve:`2024-6442` |
| ---------------- |
| |
| Bluetooth: ASCS Unchecked tailroom of the response buffer |
| |
| - `Zephyr project bug tracker GHSA-m22j-ccg7-4v4h |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m22j-ccg7-4v4h>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74976 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74976>`_ |
| |
| - `PR 77958 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/77958>`_ |
| |
| :cve:`2024-6443` |
| ---------------- |
| |
| zephyr: out-of-bound read in utf8_trunc |
| |
| - `Zephyr project bug tracker GHSA-gg46-3rh2-v765 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gg46-3rh2-v765>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74949 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74949>`_ |
| |
| - `PR 78286 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/78286>`_ |
| |
| :cve:`2024-6444` |
| ---------------- |
| |
| Bluetooth: ots: missing buffer length check |
| |
| - `Zephyr project bug tracker GHSA-qj4r-chj6-h7qp |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qj4r-chj6-h7qp>`_ |
| |
| This has been fixed in main for v3.7.0 |
| |
| - `PR 74944 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/74944>`_ |
| |
| - `PR 77954 fix for 3.6 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/77954>`_ |
| |
| :cve:`2024-8798` |
| ---------------- |
| |
| Under embargo until 2024-11-22 |
| |
| :cve:`2024-10395` |
| ----------------- |
| |
| Under embargo until 2025-01-23 |
| |
| :cve:`2024-11263` |
| ----------------- |
| |
| arch: riscv: userspace: potential security risk when CONFIG_RISCV_GP=y |
| |
| A rogue thread can corrupt the gp reg and cause the entire system to hard fault at best, at worst, |
| it can potentially trick the system to access another set of random global symbols. |
| |
| - `Zephyr project bug tracker GHSA-jjf3-7x72-pqm9 |
| <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jjf3-7x72-pqm9>`_ |
| |
| This has been fixed in main for v4.0.0 |
| |
| - `PR 81155 fix for main |
| <https://github.com/zephyrproject-rtos/zephyr/pull/81155>`_ |
| |
| - `PR 81370 fix for 3.7 |
| <https://github.com/zephyrproject-rtos/zephyr/pull/81370>`_ |