Zephyrproject

Zephyr

106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:43

Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later ver...

  • EPSS 0.37%
  • Veröffentlicht 11.05.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:43

The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This...

  • EPSS 0.7%
  • Veröffentlicht 29.08.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 03:12:20

Use After Free vulnerability in the Zephyr shell allows a serial or telnet connected user to cause denial of service, and possibly remote code execution. This issue affects: Zephyr shell versions prior to 1.14.0 on all.

  • EPSS 0.16%
  • Veröffentlicht 29.08.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 03:12:21

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in the shell component of Zephyr allows a serial or telnet connected user to cause a crash, possibly with arbitrary code execution. This issue affects: Zephyr shell...

  • EPSS 0.55%
  • Veröffentlicht 12.04.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:12:20

A buffer overflow has been found in the Zephyr Project's getaddrinfo() implementation in 1.9.0 and 1.10.0.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 06.09.2018 17:29:02
  • Zuletzt bearbeitet 21.11.2024 03:40:22

zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call...