Zephyrproject

Zephyr

119 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 11.01.2023 05:15:10
  • Zuletzt bearbeitet 21.11.2024 06:23:15

usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 11.01.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 06:38:54

There is no check to see if slot 0 is being uploaded from the device to the host. When using encrypted images this means the unencrypted firmware can be retrieved easily.

  • EPSS 0.46%
  • Veröffentlicht 09.12.2022 20:15:10
  • Zuletzt bearbeitet 22.04.2025 18:15:49

There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet.

  • EPSS 0.33%
  • Veröffentlicht 31.10.2022 18:15:13
  • Zuletzt bearbeitet 21.11.2024 07:01:37

The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on...

  • EPSS 0.24%
  • Veröffentlicht 31.08.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:41:35

In subsys/net/ip/tcp.c , function tcp_flags , when the incoming parameter flags is ECN or CWR , the buf will out-of-bounds write a byte zero.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 26.07.2022 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:39:54

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

Exploit
  • EPSS 0.11%
  • Veröffentlicht 26.07.2022 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:39:55

In Zephyr bluetooth mesh core stack, an out-of-bound write vulnerability can be triggered during provisioning.

  • EPSS 0.33%
  • Veröffentlicht 28.06.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:29

Assertion reachable with repeated LL_CONNECTION_PARAM_REQ. Zephyr versions >= v1.14 contain Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr

  • EPSS 0.39%
  • Veröffentlicht 28.06.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:29

Assertion reachable with repeated LL_FEATURE_REQ. Zephyr versions >= v2.5.0 contain Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9

  • EPSS 0.39%
  • Veröffentlicht 28.06.2022 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:29

Invalid interval in CONNECT_IND leads to Division by Zero. Zephyr versions >= v1.14.0 Divide By Zero (CWE-369). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4