Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Zephyr
(Zephyrproject)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 105 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-27 | CVE-2023-5184 | Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers. | Zephyr | 8.8 | ||
2023-10-25 | CVE-2023-5753 | Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c | Zephyr | 8.8 | ||
2024-03-15 | CVE-2023-7060 | Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address. | Zephyr | 7.5 | ||
2024-07-03 | CVE-2024-3332 | A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device | Zephyr | 6.5 | ||
2024-08-19 | CVE-2024-4785 | BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero | Zephyr | 6.5 | ||
2024-11-15 | CVE-2024-11263 | When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols. | Zephyr | 8.4 | ||
2024-12-16 | CVE-2024-8798 | No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c. | Zephyr | 6.5 | ||
2024-02-18 | CVE-2023-6249 | Signed to unsigned conversion esp32_ipm_send | Zephyr | 9.8 | ||
2024-02-29 | CVE-2023-6881 | Possible buffer overflow in is_mount_point | Zephyr | 9.8 | ||
2024-03-29 | CVE-2024-3077 | An malicious BLE device can crash BLE victim device by sending malformed gatt packet | Zephyr | 6.5 |