Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Zephyr
(Zephyrproject)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 88 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-09-26 | CVE-2023-4259 | Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code. | Zephyr | 8.8 | ||
2023-09-27 | CVE-2023-4260 | Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system. | Zephyr | 10.0 | ||
2023-09-27 | CVE-2023-4264 | Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem. | Zephyr | 9.6 | ||
2023-10-06 | CVE-2023-3725 | Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem | Zephyr | 9.8 | ||
2023-10-13 | CVE-2023-4263 | Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver | Zephyr | 8.8 | ||
2023-09-27 | CVE-2023-5184 | Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers. | Zephyr | 8.8 | ||
2023-11-21 | CVE-2023-5055 | Possible variant of CVE-2021-3434 in function le_ecred_reconf_req. | Zephyr | 9.8 | ||
2023-11-21 | CVE-2023-4424 | An malicious BLE device can cause buffer overflow by sending malformed advertising packet BLE device using Zephyr OS, leading to DoS or potential RCE on the victim BLE device. | Zephyr | 8.8 | ||
2023-10-13 | CVE-2023-5563 | The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception. | Zephyr | 7.5 | ||
2023-09-25 | CVE-2023-4258 | In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee. | Zephyr | 6.5 |