Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Zephyr
(Zephyrproject)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 105 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-02-25 | CVE-2025-1675 | The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data. | Zephyr | 9.1 | ||
2025-02-25 | CVE-2025-1673 | A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation. | Zephyr | 8.2 | ||
2025-02-25 | CVE-2025-1674 | A lack of input validation allows for out of bounds reads caused by malicious or malformed packets. | Zephyr | 8.2 | ||
2023-09-27 | CVE-2023-4260 | Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system. | Zephyr | 10.0 | ||
2023-09-27 | CVE-2023-4264 | Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem. | Zephyr | 9.6 | ||
2023-09-27 | CVE-2023-5184 | Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers. | Zephyr | 8.8 | ||
2023-10-25 | CVE-2023-5753 | Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c | Zephyr | 8.8 | ||
2024-03-15 | CVE-2023-7060 | Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address. | Zephyr | 7.5 | ||
2024-07-03 | CVE-2024-3332 | A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device | Zephyr | 6.5 | ||
2024-08-19 | CVE-2024-4785 | BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero | Zephyr | 6.5 |