Home
last modified time | relevance | path

Searched refs:security (Results 251 – 266 of 266) sorted by relevance

1...<<11

/Zephyr-latest/doc/releases/
Drelease-notes-2.1.rst25 No security vulnerabilities received.
833 * :github:`17983` - Bluetooth: Re-establish security before notifications/indications can be sent
Drelease-notes-2.6.rst32 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
247 * Added support for logging security keys to be used by an air sniffer.
258 * Added a security level check when sending a notification or indication.
274 * Fixed an issue where callbacks for "security changed" and "pairing failed"
277 reach the required security level.
Drelease-notes-2.5.rst32 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
1717 * :github:`27892` - [v2.1.x] lib: updatehub: Improve download on slow networks and security fix
1718 * :github:`27890` - [v2.2.x] lib: updatehub: Improve download on slow networks and security fix
1756 * :github:`27332` - [v2.3.x] lib: updatehub: Improve download on slow networks and security fix
Drelease-notes-3.1.rst279 security-related callbacks under a single struct
1144 This section lists security vulnerabilities, other known bugs, and all issues
1153 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
1341 * :github:`45820` - bluetooth: host: Failed to set security right after reconnection with bonded Ce…
Drelease-notes-2.4.rst43 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
701 * The L2CAP security level will now be elevated automatically when a
702 connection is rejected for security reasons.
703 * When LE Secure Connections are the only option enabled, the security level
Drelease-notes-1.11.rst452 * :github:`6025` - mbedTLS: Buffer overflow security issue, requires upgrade to 2.7.0
Drelease-notes-3.3.rst28 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
2712 - :github:`53198` - Bluetooth: Restoring security level fails and missing some notifications
3089 * :github:`53280` - Bluetooth: security level failure with multiple links
3119 * :github:`53046` - Bluetooth: Failed to set security level for the second connection
3120 * :github:`53043` - Bluetooth: Peripheral misses notifications from Central after setting security
3616 … samples: net: openthread: coprocessor: RCP is missing required capabilities: tx-security tx-timing
Drelease-notes-2.0.rst29 The following security vulnerability (CVE) was addressed in this
421 * Added support for fine-grained control of security establishment, including
Drelease-notes-2.3.rst52 https://docs.zephyrproject.org/latest/security/vulnerabilities.html
/Zephyr-latest/doc/contribute/
Dguidelines.rst627 quality, and software security ensures the effectiveness of the static
/Zephyr-latest/kernel/
DKconfig993 security attacks by making the location of any given stack frame
/Zephyr-latest/doc/develop/application/
Dindex.rst653 See :ref:`hardening` for security information related with Kconfig options.
/Zephyr-latest/subsys/bluetooth/host/shell/
Dbt.c5085 SHELL_CMD_ARG(security, NULL, "<security level BR/EDR: 0 - 3, "
/Zephyr-latest/cmake/modules/
Dextensions.cmake2542 # To test flags together, such as '-Wformat -Wformat-security', an option group
2545 # '"SHELL:-Wformat -Wformat-security"' becomes '-Wformat -Wformat-security' for
/Zephyr-latest/doc/connectivity/bluetooth/api/mesh/
Dshell.rst259 Clearing the replay protection list breaks the security mechanisms of the mesh node, making
/Zephyr-latest/samples/modules/tflite-micro/hello_world/train/
Dtrain_hello_world_model.ipynb3429 … \rHit:6 http://security.ubuntu.com/ubuntu bionic-security

1...<<11