1.. _vulnerabilities: 2 3Vulnerabilities 4############### 5 6This page collects all of the vulnerabilities that are discovered and 7fixed in each release. It will also often have more details than is 8available in the releases. Some vulnerabilities are deemed to be 9sensitive, and will not be publicly discussed until there is 10sufficient time to fix them. Because the release notes are locked to 11a version, the information here can be updated after the embargo is 12lifted. 13 14CVE-2017 15======== 16 17:cve:`2017-14199` 18----------------- 19 20Buffer overflow in :code:`getaddrinfo()`. 21 22- `Zephyr project bug tracker ZEPSEC-12 23 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_ 24 25- `PR6158 fix for 1.11.0 26 <https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_ 27 28:cve:`2017-14201` 29----------------- 30 31The shell DNS command can cause unpredictable results due to misuse of 32stack variables. 33 34Use After Free vulnerability in the Zephyr shell allows a serial or 35telnet connected user to cause denial of service, and possibly remote 36code execution. 37 38This has been fixed in release v1.14.0. 39 40- `Zephyr project bug tracker ZEPSEC-17 41 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17>`_ 42 43- `PR13260 fix for v1.14.0 44 <https://github.com/zephyrproject-rtos/zephyr/pull/13260>`_ 45 46:cve:`2017-14202` 47----------------- 48 49The shell implementation does not protect against buffer overruns 50resulting in unpredictable behavior. 51 52Improper Restriction of Operations within the Bounds of a Memory 53Buffer vulnerability in the shell component of Zephyr allows a serial 54or telnet connected user to cause a crash, possibly with arbitrary 55code execution. 56 57This has been fixed in release v1.14.0. 58 59- `Zephyr project bug tracker ZEPSEC-18 60 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18>`_ 61 62- `PR13048 fix for v1.14.0 63 <https://github.com/zephyrproject-rtos/zephyr/pull/13048>`_ 64 65CVE-2019 66======== 67 68:cve:`2019-9506` 69---------------- 70 71The Bluetooth BR/EDR specification up to and including version 5.1 72permits sufficiently low encryption key length and does not prevent an 73attacker from influencing the key length negotiation. This allows 74practical brute-force attacks (aka "KNOB") that can decrypt traffic 75and inject arbitrary ciphertext without the victim noticing. 76 77- `Zephyr project bug tracker ZEPSEC-20 78 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-20>`_ 79 80- `PR18702 fix for v1.14.0 81 <https://github.com/zephyrproject-rtos/zephyr/pull/18702>`_ 82 83- `PR18659 fix for v2.0.0 84 <https://github.com/zephyrproject-rtos/zephyr/pull/18659>`_ 85 86CVE-2020 87======== 88 89:cve:`2020-10019` 90----------------- 91 92Buffer Overflow vulnerability in USB DFU of zephyr allows a USB 93connected host to cause possible remote code execution. 94 95This has been fixed in releases v1.14.2, v2.2.0, and v2.1.1. 96 97- `Zephyr project bug tracker ZEPSEC-25 98 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25>`_ 99 100- `PR23460 fix for 1.14.x 101 <https://github.com/zephyrproject-rtos/zephyr/pull/23460>`_ 102 103- `PR23457 fix for 2.1.x 104 <https://github.com/zephyrproject-rtos/zephyr/pull/23457>`_ 105 106- `PR23190 fix in 2.2.0 107 <https://github.com/zephyrproject-rtos/zephyr/pull/23190>`_ 108 109:cve:`2020-10021` 110----------------- 111 112Out-of-bounds write in USB Mass Storage with unaligned sizes 113 114Out-of-bounds Write in the USB Mass Storage memoryWrite handler with 115unaligned Sizes. 116 117See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 118 119This has been fixed in releases v1.14.2, and v2.2.0. 120 121- `Zephyr project bug tracker ZEPSEC-26 122 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26>`_ 123 124- `PR23455 fix for v1.14.2 125 <https://github.com/zephyrproject-rtos/zephyr/pull/23455>`_ 126 127- `PR23456 fix for the v2.1 branch 128 <https://github.com/zephyrproject-rtos/zephyr/pull/23456>`_ 129 130- `PR23240 fix for v2.2.0 131 <https://github.com/zephyrproject-rtos/zephyr/pull/23240>`_ 132 133:cve:`2020-10022` 134----------------- 135 136UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array 137 138A malformed JSON payload that is received from an UpdateHub server may 139trigger memory corruption in the Zephyr OS. This could result in a 140denial of service in the best case, or code execution in the worst 141case. 142 143See NCC-ZEP-016 144 145This has been fixed in the below pull requests for main, branch from 146v2.1.0, and branch from v2.2.0. 147 148- `Zephyr project bug tracker ZEPSEC-28 149 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28>`_ 150 151- `PR24154 fix for main 152 <https://github.com/zephyrproject-rtos/zephyr/pull/24154>`_ 153 154- `PR24065 fix for branch from v2.1.0 155 <https://github.com/zephyrproject-rtos/zephyr/pull/24065>`_ 156 157- `PR24066 fix for branch from v2.2.0 158 <https://github.com/zephyrproject-rtos/zephyr/pull/24066>`_ 159 160:cve:`2020-10023` 161----------------- 162 163Shell Subsystem Contains a Buffer Overflow Vulnerability In 164shell_spaces_trim 165 166The shell subsystem contains a buffer overflow, whereby an adversary 167with physical access to the device is able to cause a memory 168corruption, resulting in denial of service or possibly code execution 169within the Zephyr kernel. 170 171See NCC-ZEP-019 172 173This has been fixed in releases v1.14.2, v2.2.0, and in a branch from 174v2.1.0, 175 176- `Zephyr project bug tracker ZEPSEC-29 177 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29>`_ 178 179- `PR23646 fix for v1.14.2 180 <https://github.com/zephyrproject-rtos/zephyr/pull/23646>`_ 181 182- `PR23649 fix for branch from v2.1.0 183 <https://github.com/zephyrproject-rtos/zephyr/pull/23649>`_ 184 185- `PR23304 fix for v2.2.0 186 <https://github.com/zephyrproject-rtos/zephyr/pull/23304>`_ 187 188:cve:`2020-10024` 189----------------- 190 191ARM Platform Uses Signed Integer Comparison When Validating Syscall 192Numbers 193 194The arm platform-specific code uses a signed integer comparison when 195validating system call numbers. An attacker who has obtained code 196execution within a user thread is able to elevate privileges to that 197of the kernel. 198 199See NCC-ZEP-001 200 201This has been fixed in releases v1.14.2, and v2.2.0, and in a branch 202from v2.1.0, 203 204- `Zephyr project bug tracker ZEPSEC-30 205 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30>`_ 206 207- `PR23535 fix for v1.14.2 208 <https://github.com/zephyrproject-rtos/zephyr/pull/23535>`_ 209 210- `PR23498 fix for branch from v2.1.0 211 <https://github.com/zephyrproject-rtos/zephyr/pull/23498>`_ 212 213- `PR23323 fix for v2.2.0 214 <https://github.com/zephyrproject-rtos/zephyr/pull/23323>`_ 215 216:cve:`2020-10027` 217----------------- 218 219ARC Platform Uses Signed Integer Comparison When Validating Syscall 220Numbers 221 222An attacker who has obtained code execution within a user thread is 223able to elevate privileges to that of the kernel. 224 225See NCC-ZEP-001 226 227This has been fixed in releases v1.14.2, and v2.2.0, and in a branch 228from v2.1.0. 229 230- `Zephyr project bug tracker ZEPSEC-35 231 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35>`_ 232 233- `PR23500 fix for v1.14.2 234 <https://github.com/zephyrproject-rtos/zephyr/pull/23500>`_ 235 236- `PR23499 fix for branch from v2.1.0 237 <https://github.com/zephyrproject-rtos/zephyr/pull/23499>`_ 238 239- `PR23328 fix for v2.2.0 240 <https://github.com/zephyrproject-rtos/zephyr/pull/23328>`_ 241 242:cve:`2020-10028` 243----------------- 244 245Multiple Syscalls In GPIO Subsystem Performs No Argument Validation 246 247Multiple syscalls with insufficient argument validation 248 249See NCC-ZEP-006 250 251This has been fixed in releases v1.14.2, and v2.2.0, and in a branch 252from v2.1.0. 253 254- `Zephyr project bug tracker ZEPSEC-32 255 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32>`_ 256 257- `PR23733 fix for v1.14.2 258 <https://github.com/zephyrproject-rtos/zephyr/pull/23733>`_ 259 260- `PR23737 fix for branch from v2.1.0 261 <https://github.com/zephyrproject-rtos/zephyr/pull/23737>`_ 262 263- `PR23308 fix for v2.2.0 (gpio patch) 264 <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ 265 266:cve:`2020-10058` 267----------------- 268 269Multiple Syscalls In kscan Subsystem Performs No Argument Validation 270 271Multiple syscalls in the Kscan subsystem perform insufficient argument 272validation, allowing code executing in userspace to potentially gain 273elevated privileges. 274 275See NCC-ZEP-006 276 277This has been fixed in a branch from v2.1.0, and release v2.2.0. 278 279- `Zephyr project bug tracker ZEPSEC-34 280 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34>`_ 281 282- `PR23748 fix for branch from v2.1.0 283 <https://github.com/zephyrproject-rtos/zephyr/pull/23748>`_ 284 285- `PR23308 fix for v2.2.0 (kscan patch) 286 <https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_ 287 288:cve:`2020-10059` 289----------------- 290 291UpdateHub Module Explicitly Disables TLS Verification 292 293The UpdateHub module disables DTLS peer checking, which allows for a 294man in the middle attack. This is mitigated by firmware images 295requiring valid signatures. However, there is no benefit to using DTLS 296without the peer checking. 297 298See NCC-ZEP-018 299 300This has been fixed in a PR against Zephyr main. 301 302- `Zephyr project bug tracker ZEPSEC-36 303 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36>`_ 304 305- `PR24954 fix on main (to be fixed in v2.3.0) 306 <https://github.com/zephyrproject-rtos/zephyr/pull/24954>`_ 307 308- `PR24954 fix v2.1.0 309 <https://github.com/zephyrproject-rtos/zephyr/pull/24999>`_ 310 311- `PR24954 fix v2.2.0 312 <https://github.com/zephyrproject-rtos/zephyr/pull/24997>`_ 313 314:cve:`2020-10060` 315----------------- 316 317UpdateHub Might Dereference An Uninitialized Pointer 318 319In updatehub_probe, right after JSON parsing is complete, objects\[1] 320is accessed from the output structure in two different places. If the 321JSON contained less than two elements, this access would reference 322uninitialized stack memory. This could result in a crash, denial of 323service, or possibly an information leak. 324 325Recommend disabling updatehub until such a time as a fix can be made 326available. 327 328See NCC-ZEP-030 329 330This has been fixed in a PR against Zephyr main. 331 332- `Zephyr project bug tracker ZEPSEC-37 333 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_ 334 335- `PR27865 fix on main (to be fixed in v2.4.0) 336 <https://github.com/zephyrproject-rtos/zephyr/pull/27865>`_ 337 338- `PR27865 fix for v2.3.0 339 <https://github.com/zephyrproject-rtos/zephyr/pull/27889>`_ 340 341- `PR27865 fix for v2.2.0 342 <https://github.com/zephyrproject-rtos/zephyr/pull/27891>`_ 343 344- `PR27865 fix for v2.1.0 345 <https://github.com/zephyrproject-rtos/zephyr/pull/27893>`_ 346 347:cve:`2020-10061` 348----------------- 349 350Error handling invalid packet sequence 351 352Improper handling of the full-buffer case in the Zephyr Bluetooth 353implementation can result in memory corruption. 354 355This has been fixed in branches for v1.14.0, v2.2.0, and will be 356included in v2.3.0. 357 358- `Zephyr project bug tracker ZEPSEC-75 359 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75>`_ 360 361- `PR23516 fix for v2.3 (split driver) 362 <https://github.com/zephyrproject-rtos/zephyr/pull/23516>`_ 363 364- `PR23517 fix for v2.3 (legacy driver) 365 <https://github.com/zephyrproject-rtos/zephyr/pull/23517>`_ 366 367- `PR23091 fix for branch from v1.14.0 368 <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ 369 370- `PR23547 fix for branch from v2.2.0 371 <https://github.com/zephyrproject-rtos/zephyr/pull/23547>`_ 372 373:cve:`2020-10062` 374----------------- 375 376Packet length decoding error in MQTT 377 378CVE: An off-by-one error in the Zephyr project MQTT packet length 379decoder can result in memory corruption and possible remote code 380execution. NCC-ZEP-031 381 382The MQTT packet header length can be 1 to 4 bytes. An off-by-one error 383in the code can result in this being interpreted as 5 bytes, which can 384cause an integer overflow, resulting in memory corruption. 385 386This has been fixed in main for v2.3. 387 388- `Zephyr project bug tracker ZEPSEC-84 389 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84>`_ 390 391- `commit 11b7a37d for v2.3 392 <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4>`_ 393 394- `NCC-ZEP report`_ (NCC-ZEP-031) 395 396.. _NCC-ZEP report: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment 397 398:cve:`2020-10063` 399----------------- 400 401Remote Denial of Service in CoAP Option Parsing Due To Integer 402Overflow 403 404A remote adversary with the ability to send arbitrary CoAP packets to 405be parsed by Zephyr is able to cause a denial of service. 406 407This has been fixed in main for v2.3. 408 409- `Zephyr project bug tracker ZEPSEC-55 410 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55>`_ 411 412- `PR24435 fix in main for v2.3 413 <https://github.com/zephyrproject-rtos/zephyr/pull/24435>`_ 414 415- `PR24531 fix for branch from v2.2 416 <https://github.com/zephyrproject-rtos/zephyr/pull/24531>`_ 417 418- `PR24535 fix for branch from v2.1 419 <https://github.com/zephyrproject-rtos/zephyr/pull/24535>`_ 420 421- `PR24530 fix for branch from v1.14 422 <https://github.com/zephyrproject-rtos/zephyr/pull/24530>`_ 423 424- `NCC-ZEP report`_ (NCC-ZEP-032) 425 426:cve:`2020-10064` 427----------------- 428 429Improper Input Frame Validation in ieee802154 Processing 430 431- `Zephyr project bug tracker ZEPSEC-65 432 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-65>`_ 433 434- `PR24971 fix for v2.4 435 <https://github.com/zephyrproject-rtos/zephyr/pull/24971>`_ 436 437- `PR33451 fix for v1.4 438 <https://github.com/zephyrproject-rtos/zephyr/pull/33451>`_ 439 440:cve:`2020-10065` 441----------------- 442 443OOB Write after not validating user-supplied length (<= 0xffff) and 444copying to fixed-size buffer (default: 77 bytes) for HCI_ACL packets in 445bluetooth HCI over SPI driver. 446 447- `Zephyr project bug tracker ZEPSEC-66 448 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-66>`_ 449 450- This issue has not been fixed. 451 452:cve:`2020-10066` 453----------------- 454 455Incorrect Error Handling in Bluetooth HCI core 456 457In hci_cmd_done, the buf argument being passed as null causes 458nullpointer dereference. 459 460- `Zephyr project bug tracker ZEPSEC-67 461 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-67>`_ 462 463- `PR24902 fix for v2.4 464 <https://github.com/zephyrproject-rtos/zephyr/pull/24902>`_ 465 466- `PR25089 fix for v1.4 467 <https://github.com/zephyrproject-rtos/zephyr/pull/25089>`_ 468 469:cve:`2020-10067` 470----------------- 471 472Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory 473 474A malicious userspace application can cause a integer overflow and 475bypass security checks performed by system call handlers. The impact 476would depend on the underlying system call and can range from denial 477of service to information leak to memory corruption resulting in code 478execution within the kernel. 479 480See NCC-ZEP-005 481 482This has been fixed in releases v1.14.2, and v2.2.0. 483 484- `Zephyr project bug tracker ZEPSEC-27 485 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27>`_ 486 487- `PR23653 fix for v1.14.2 488 <https://github.com/zephyrproject-rtos/zephyr/pull/23653>`_ 489 490- `PR23654 fix for the v2.1 branch 491 <https://github.com/zephyrproject-rtos/zephyr/pull/23654>`_ 492 493- `PR23239 fix for v2.2.0 494 <https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_ 495 496:cve:`2020-10068` 497----------------- 498 499Zephyr Bluetooth DLE duplicate requests vulnerability 500 501In the Zephyr project Bluetooth subsystem, certain duplicate and 502back-to-back packets can cause incorrect behavior, resulting in a 503denial of service. 504 505This has been fixed in branches for v1.14.0, v2.2.0, and will be 506included in v2.3.0. 507 508- `Zephyr project bug tracker ZEPSEC-78 509 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78>`_ 510 511- `PR23707 fix for v2.3 (split driver) 512 <https://github.com/zephyrproject-rtos/zephyr/pull/23707>`_ 513 514- `PR23708 fix for v2.3 (legacy driver) 515 <https://github.com/zephyrproject-rtos/zephyr/pull/23708>`_ 516 517- `PR23091 fix for branch from v1.14.0 518 <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ 519 520- `PR23964 fix for v2.2.0 521 <https://github.com/zephyrproject-rtos/zephyr/pull/23964>`_ 522 523:cve:`2020-10069` 524----------------- 525 526Zephyr Bluetooth unchecked packet data results in denial of service 527 528An unchecked parameter in bluetooth data can result in an assertion 529failure, or division by zero, resulting in a denial of service attack. 530 531This has been fixed in branches for v1.14.0, v2.2.0, and will be 532included in v2.3.0. 533 534- `Zephyr project bug tracker ZEPSEC-81 535 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81>`_ 536 537- `PR23705 fix for v2.3 (split driver) 538 <https://github.com/zephyrproject-rtos/zephyr/pull/23705>`_ 539 540- `PR23706 fix for v2.3 (legacy driver) 541 <https://github.com/zephyrproject-rtos/zephyr/pull/23706>`_ 542 543- `PR23091 fix for branch from v1.14.0 544 <https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_ 545 546- `PR23963 fix for branch from v2.2.0 547 <https://github.com/zephyrproject-rtos/zephyr/pull/23963>`_ 548 549:cve:`2020-10070` 550----------------- 551 552MQTT buffer overflow on receive buffer 553 554In the Zephyr Project MQTT code, improper bounds checking can result 555in memory corruption and possibly remote code execution. NCC-ZEP-031 556 557When calculating the packet length, arithmetic overflow can result in 558accepting a receive buffer larger than the available buffer space, 559resulting in user data being written beyond this buffer. 560 561This has been fixed in main for v2.3. 562 563- `Zephyr project bug tracker ZEPSEC-85 564 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85>`_ 565 566- `commit 0b39cbf3 for v2.3 567 <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542>`_ 568 569- `NCC-ZEP report`_ (NCC-ZEP-031) 570 571:cve:`2020-10071` 572----------------- 573 574Insufficient publish message length validation in MQTT 575 576The Zephyr MQTT parsing code performs insufficient checking of the 577length field on publish messages, allowing a buffer overflow and 578potentially remote code execution. NCC-ZEP-031 579 580This has been fixed in main for v2.3. 581 582- `Zephyr project bug tracker ZEPSEC-86 583 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86>`_ 584 585- `commit 989c4713 fix for v2.3 586 <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082>`_ 587 588- `NCC-ZEP report`_ (NCC-ZEP-031) 589 590:cve:`2020-10072` 591----------------- 592 593All threads can access all socket file descriptors 594 595There is no management of permissions to network socket API file 596descriptors. Any thread running on the system may read/write a socket 597file descriptor knowing only the numerical value of the file 598descriptor. 599 600- `Zephyr project bug tracker ZEPSEC-87 601 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-87>`_ 602 603- `PR25804 fix for v2.4 604 <https://github.com/zephyrproject-rtos/zephyr/pull/25804>`_ 605 606- `PR27176 fix for v1.4 607 <https://github.com/zephyrproject-rtos/zephyr/pull/27176>`_ 608 609:cve:`2020-10136` 610----------------- 611 612IP-in-IP protocol routes arbitrary traffic by default zephyrproject 613 614- `Zephyr project bug tracker ZEPSEC-64 615 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-64>`_ 616 617:cve:`2020-13598` 618----------------- 619 620FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat 621 622Performing fs_stat on a file with a filename longer than 12 623characters long will cause a buffer overflow. 624 625- `Zephyr project bug tracker ZEPSEC-88 626 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-88>`_ 627 628- `PR25852 fix for v2.4 629 <https://github.com/zephyrproject-rtos/zephyr/pull/25852>`_ 630 631- `PR28782 fix for v2.3 632 <https://github.com/zephyrproject-rtos/zephyr/pull/28782>`_ 633 634- `PR33577 fix for v1.4 635 <https://github.com/zephyrproject-rtos/zephyr/pull/33577>`_ 636 637:cve:`2020-13599` 638----------------- 639 640Security problem with settings and littlefs 641 642When settings is used in combination with littlefs all security 643related information can be extracted from the device using MCUmgr and 644this could be used e.g in bt-mesh to get the device key, network key, 645app keys from the device. 646 647- `Zephyr project bug tracker ZEPSEC-57 648 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-57>`_ 649 650- `PR26083 fix for v2.4 651 <https://github.com/zephyrproject-rtos/zephyr/pull/26083>`_ 652 653:cve:`2020-13600` 654----------------- 655 656Malformed SPI in response for eswifi can corrupt kernel memory 657 658 659- `Zephyr project bug tracker ZEPSEC-91 660 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-91>`_ 661 662- `PR26712 fix for v2.4 663 <https://github.com/zephyrproject-rtos/zephyr/pull/26712>`_ 664 665:cve:`2020-13601` 666----------------- 667 668Possible read out of bounds in dns read 669 670- `Zephyr project bug tracker ZEPSEC-92 671 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-92>`_ 672 673- `PR27774 fix for v2.4 674 <https://github.com/zephyrproject-rtos/zephyr/pull/27774>`_ 675 676- `PR30503 fix for v1.4 677 <https://github.com/zephyrproject-rtos/zephyr/pull/30503>`_ 678 679:cve:`2020-13602` 680----------------- 681 682Remote Denial of Service in LwM2M do_write_op_tlv 683 684In the Zephyr LwM2M implementation, malformed input can result in an 685infinite loop, resulting in a denial of service attack. 686 687- `Zephyr project bug tracker ZEPSEC-56 688 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-56>`_ 689 690- `PR26571 fix for v2.4 691 <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ 692 693- `PR33578 fix for v1.4 694 <https://github.com/zephyrproject-rtos/zephyr/pull/33578>`_ 695 696:cve:`2020-13603` 697----------------- 698 699Possible overflow in mempool 700 701 * Zephyr offers pre-built 'malloc' wrapper function instead. 702 * The 'malloc' function is wrapper for the 'sys_mem_pool_alloc' function 703 * sys_mem_pool_alloc allocates 'size + WB_UP(sizeof(struct sys_mem_pool_block))' in an unsafe manner. 704 * Asking for very large size values leads to internal integer wrap-around. 705 * Integer wrap-around leads to successful allocation of very small memory. 706 * For example: calling malloc(0xffffffff) leads to successful allocation of 7 bytes. 707 * That leads to heap overflow. 708 709- `Zephyr project bug tracker ZEPSEC-111 710 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-111>`_ 711 712- `PR31796 fix for v2.4 713 <https://github.com/zephyrproject-rtos/zephyr/pull/31796>`_ 714 715- `PR32808 fix for v1.4 716 <https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_ 717 718CVE-2021 719======== 720 721:cve:`2021-3319` 722---------------- 723 724DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses 725 726Improper processing of omitted source and destination addresses in 727ieee802154 frame validation (ieee802154_validate_frame) 728 729This has been fixed in main for v2.5.0 730 731- `Zephyr project bug tracker GHSA-94jg-2p6q-5364 732 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364>`_ 733 734- `PR31908 fix for main 735 <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ 736 737:cve:`2021-3320` 738---------------- 739Mismatch between validation and handling of 802154 ACK frames, where 740ACK frames are considered during validation, but not during actual 741processing, leading to a type confusion. 742 743- `PR31908 fix for main 744 <https://github.com/zephyrproject-rtos/zephyr/pull/31908>`_ 745 746:cve:`2021-3321` 747---------------- 748 749Incomplete check of minimum IEEE 802154 fragment size leading to an 750integer underflow. 751 752- `Zephyr project bug tracker ZEPSEC-114 753 <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-114>`_ 754 755- `PR33453 fix for v2.4 756 <https://github.com/zephyrproject-rtos/zephyr/pull/33453>`_ 757 758:cve:`2021-3323` 759---------------- 760 761Integer Underflow in 6LoWPAN IPHC Header Uncompression 762 763This has been fixed in main for v2.5.0 764 765- `Zephyr project bug tracker GHSA-89j6-qpxf-pfpc 766 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc>`_ 767 768- `PR 31971 fix for main 769 <https://github.com/zephyrproject-rtos/zephyr/pull/31971>`_ 770 771:cve:`2021-3430` 772---------------- 773 774Assertion reachable with repeated LL_CONNECTION_PARAM_REQ. 775 776This has been fixed in main for v2.6.0 777 778- `Zephyr project bug tracker GHSA-46h3-hjcq-2jjr 779 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr>`_ 780 781- `PR 33272 fix for main 782 <https://github.com/zephyrproject-rtos/zephyr/pull/33272>`_ 783 784- `PR 33369 fix for 2.5 785 <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ 786 787- `PR 33759 fix for 1.14.2 788 <https://github.com/zephyrproject-rtos/zephyr/pull/33759>`_ 789 790:cve:`2021-3431` 791---------------- 792 793BT: Assertion failure on repeated LL_FEATURE_REQ 794 795This has been fixed in main for v2.6.0 796 797- `Zephyr project bug tracker GHSA-7548-5m6f-mqv9 798 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9>`_ 799 800- `PR 33340 fix for main 801 <https://github.com/zephyrproject-rtos/zephyr/pull/33340>`_ 802 803- `PR 33369 fix for 2.5 804 <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ 805 806:cve:`2021-3432` 807---------------- 808 809Invalid interval in CONNECT_IND leads to Division by Zero 810 811This has been fixed in main for v2.6.0 812 813- `Zephyr project bug tracker GHSA-7364-p4wc-8mj4 814 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4>`_ 815 816- `PR 33278 fix for main 817 <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ 818 819- `PR 33369 fix for 2.5 820 <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ 821 822:cve:`2021-3433` 823---------------- 824 825BT: Invalid channel map in CONNECT_IND results to Deadlock 826 827This has been fixed in main for v2.6.0 828 829- `Zephyr project bug tracker GHSA-3c2f-w4v6-qxrp 830 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp>`_ 831 832- `PR 33278 fix for main 833 <https://github.com/zephyrproject-rtos/zephyr/pull/33278>`_ 834 835- `PR 33369 fix for 2.5 836 <https://github.com/zephyrproject-rtos/zephyr/pull/33369>`_ 837 838:cve:`2021-3434` 839---------------- 840 841L2CAP: Stack based buffer overflow in le_ecred_conn_req() 842 843This has been fixed in main for v2.6.0 844 845- `Zephyr project bug tracker GHSA-8w87-6rfp-cfrm 846 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm>`_ 847 848- `PR 33305 fix for main 849 <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ 850 851- `PR 33419 fix for 2.5 852 <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ 853 854- `PR 33418 fix for 1.14.2 855 <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ 856 857:cve:`2021-3435` 858---------------- 859 860L2CAP: Information leakage in le_ecred_conn_req() 861 862This has been fixed in main for v2.6.0 863 864- `Zephyr project bug tracker GHSA-xhg3-gvj6-4rqh 865 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh>`_ 866 867- `PR 33305 fix for main 868 <https://github.com/zephyrproject-rtos/zephyr/pull/33305>`_ 869 870- `PR 33419 fix for 2.5 871 <https://github.com/zephyrproject-rtos/zephyr/pull/33419>`_ 872 873- `PR 33418 fix for 1.14.2 874 <https://github.com/zephyrproject-rtos/zephyr/pull/33418>`_ 875 876:cve:`2021-3436` 877---------------- 878 879Bluetooth: Possible to overwrite an existing bond during keys 880distribution phase when the identity address of the bond is known 881 882During the distribution of the identity address information we don’t 883check for an existing bond with the same identity address.This means 884that a duplicate entry will be created in RAM while the newest entry 885will overwrite the existing one in persistent storage. 886 887This has been fixed in main for v2.6.0 888 889- `Zephyr project bug tracker GHSA-j76f-35mc-4h63 890 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63>`_ 891 892- `PR 33266 fix for main 893 <https://github.com/zephyrproject-rtos/zephyr/pull/33266>`_ 894 895- `PR 33432 fix for 2.5 896 <https://github.com/zephyrproject-rtos/zephyr/pull/33432>`_ 897 898- `PR 33433 fix for 2.4 899 <https://github.com/zephyrproject-rtos/zephyr/pull/33433>`_ 900 901- `PR 33718 fix for 1.14.2 902 <https://github.com/zephyrproject-rtos/zephyr/pull/33718>`_ 903 904:cve:`2021-3454` 905---------------- 906 907Truncated L2CAP K-frame causes assertion failure 908 909For example, sending L2CAP K-frame where SDU length field is truncated 910to only one byte, causes assertion failure in previous releases of 911Zephyr. This has been fixed in master by commit 0ba9437 but has not 912yet been backported to older release branches. 913 914This has been fixed in main for v2.6.0 915 916- `Zephyr project bug tracker GHSA-fx88-6c29-vrp3 917 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3>`_ 918 919- `PR 32588 fix for main 920 <https://github.com/zephyrproject-rtos/zephyr/pull/32588>`_ 921 922- `PR 33513 fix for 2.5 923 <https://github.com/zephyrproject-rtos/zephyr/pull/33513>`_ 924 925- `PR 33514 fix for 2.4 926 <https://github.com/zephyrproject-rtos/zephyr/pull/33514>`_ 927 928:cve:`2021-3455` 929---------------- 930 931Disconnecting L2CAP channel right after invalid ATT request leads freeze 932 933When Central device connects to peripheral and creates L2CAP 934connection for Enhanced ATT, sending some invalid ATT request and 935disconnecting immediately causes freeze. 936 937This has been fixed in main for v2.6.0 938 939- `Zephyr project bug tracker GHSA-7g38-3x9v-v7vp 940 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp>`_ 941 942- `PR 35597 fix for main 943 <https://github.com/zephyrproject-rtos/zephyr/pull/35597>`_ 944 945- `PR 36104 fix for 2.5 946 <https://github.com/zephyrproject-rtos/zephyr/pull/36104>`_ 947 948- `PR 36105 fix for 2.4 949 <https://github.com/zephyrproject-rtos/zephyr/pull/36105>`_ 950 951:cve:`2021-3510` 952---------------- 953 954Zephyr JSON decoder incorrectly decodes array of array 955 956When using JSON_OBJ_DESCR_ARRAY_ARRAY, the subarray is has the token 957type JSON_TOK_LIST_START, but then assigns to the object part of the 958union. arr_parse then takes the offset of the array-object (which has 959nothing todo with the list) treats it as relative to the parent 960object, and stores the length of the subarray in there. 961 962This has been fixed in main for v2.7.0 963 964- `Zephyr project bug tracker GHSA-289f-7mw3-2qf4 965 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4>`_ 966 967- `PR 36340 fix for main 968 <https://github.com/zephyrproject-rtos/zephyr/pull/36340>`_ 969 970- `PR 37816 fix for 2.6 971 <https://github.com/zephyrproject-rtos/zephyr/pull/37816>`_ 972 973:cve:`2021-3581` 974---------------- 975 976HCI data not properly checked leads to memory overflow in the Bluetooth stack 977 978In the process of setting SCAN_RSP through the HCI command, the Zephyr 979Bluetooth protocol stack did not effectively check the length of the 980incoming HCI data. Causes memory overflow, and then the data in the 981memory is overwritten, and may even cause arbitrary code execution. 982 983This has been fixed in main for v2.6.0 984 985- `Zephyr project bug tracker GHSA-8q65-5gqf-fmw5 986 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5>`_ 987 988- `PR 35935 fix for main 989 <https://github.com/zephyrproject-rtos/zephyr/pull/35935>`_ 990 991- `PR 35984 fix for 2.5 992 <https://github.com/zephyrproject-rtos/zephyr/pull/35984>`_ 993 994- `PR 35985 fix for 2.4 995 <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ 996 997- `PR 35985 fix for 1.14 998 <https://github.com/zephyrproject-rtos/zephyr/pull/35985>`_ 999 1000:cve:`2021-3625` 1001---------------- 1002 1003Buffer overflow in Zephyr USB DFU DNLOAD 1004 1005This has been fixed in main for v2.6.0 1006 1007- `Zephyr project bug tracker GHSA-c3gr-hgvr-f363 1008 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363>`_ 1009 1010- `PR 36694 fix for main 1011 <https://github.com/zephyrproject-rtos/zephyr/pull/36694>`_ 1012 1013:cve:`2021-3835` 1014---------------- 1015 1016Buffer overflow in Zephyr USB device class 1017 1018This has been fixed in main for v3.0.0 1019 1020- `Zephyr project bug tracker GHSA-fm6v-8625-99jf 1021 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf>`_ 1022 1023- `PR 42093 fix for main 1024 <https://github.com/zephyrproject-rtos/zephyr/pull/42093>`_ 1025 1026- `PR 42167 fix for 2.7 1027 <https://github.com/zephyrproject-rtos/zephyr/pull/42167>`_ 1028 1029:cve:`2021-3861` 1030---------------- 1031 1032Buffer overflow in the RNDIS USB device class 1033 1034This has been fixed in main for v3.0.0 1035 1036- `Zephyr project bug tracker GHSA-hvfp-w4h8-gxvj 1037 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj>`_ 1038 1039- `PR 39725 fix for main 1040 <https://github.com/zephyrproject-rtos/zephyr/pull/39725>`_ 1041 1042:cve:`2021-3966` 1043---------------- 1044 1045Usb bluetooth device ACL read cb buffer overflow 1046 1047This has been fixed in main for v3.0.0 1048 1049- `Zephyr project bug tracker GHSA-hfxq-3w6x-fv2m 1050 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfxq-3w6x-fv2m>`_ 1051 1052- `PR 42093 fix for main 1053 <https://github.com/zephyrproject-rtos/zephyr/pull/42093>`_ 1054 1055- `PR 42167 fix for v2.7.0 1056 <https://github.com/zephyrproject-rtos/zephyr/pull/42167>`_ 1057 1058CVE-2022 1059======== 1060 1061:cve:`2022-0553` 1062---------------- 1063 1064Possible to retrieve unencrypted firmware image 1065 1066This has been fixed in main for v3.0.0 1067 1068- `Zephyr project bug tracker GHSA-wrj2-9vj9-rrcp 1069 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wrj2-9vj9-rrcp>`_ 1070 1071- `PR 42424 fix for main 1072 <https://github.com/zephyrproject-rtos/zephyr/pull/42424>`_ 1073 1074:cve:`2022-1041` 1075---------------- 1076 1077Out-of-bound write vulnerability in the Bluetooth Mesh core stack can be triggered during provisioning 1078 1079This has been fixed in main for v3.1.0 1080 1081- `Zephyr project bug tracker GHSA-p449-9hv9-pj38 1082 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p449-9hv9-pj38>`_ 1083 1084- `PR 45136 fix for main 1085 <https://github.com/zephyrproject-rtos/zephyr/pull/45136>`_ 1086 1087- `PR 45188 fix for v3.0.0 1088 <https://github.com/zephyrproject-rtos/zephyr/pull/45188>`_ 1089 1090- `PR 45187 fix for v2.7.0 1091 <https://github.com/zephyrproject-rtos/zephyr/pull/45187>`_ 1092 1093:cve:`2022-1042` 1094---------------- 1095 1096Out-of-bound write vulnerability in the Bluetooth Mesh core stack can be triggered during provisioning 1097 1098This has been fixed in main for v3.1.0 1099 1100- `Zephyr project bug tracker GHSA-j7v7-w73r-mm5x 1101 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j7v7-w73r-mm5x>`_ 1102 1103- `PR 45066 fix for main 1104 <https://github.com/zephyrproject-rtos/zephyr/pull/45066>`_ 1105 1106- `PR 45135 fix for v3.0.0 1107 <https://github.com/zephyrproject-rtos/zephyr/pull/45135>`_ 1108 1109- `PR 45134 fix for v2.7.0 1110 <https://github.com/zephyrproject-rtos/zephyr/pull/45134>`_ 1111 1112:cve:`2022-1841` 1113---------------- 1114 1115Out-of-Bound Write in tcp_flags 1116 1117This has been fixed in main for v3.1.0 1118 1119- `Zephyr project bug tracker GHSA-5c3j-p8cr-2pgh 1120 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-5c3j-p8cr-2pgh>`_ 1121 1122- `PR 45796 fix for main 1123 <https://github.com/zephyrproject-rtos/zephyr/pull/45796>`_ 1124 1125:cve:`2022-2741` 1126---------------- 1127 1128can: denial-of-service can be triggered by a crafted CAN frame 1129 1130This has been fixed in main for v3.2.0 1131 1132- `Zephyr project bug tracker GHSA-hx5v-j59q-c3j8 1133 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx5v-j59q-c3j8>`_ 1134 1135- `PR 47903 fix for main 1136 <https://github.com/zephyrproject-rtos/zephyr/pull/47903>`_ 1137 1138- `PR 47957 fix for v3.1.0 1139 <https://github.com/zephyrproject-rtos/zephyr/pull/47957>`_ 1140 1141- `PR 47958 fix for v3.0.0 1142 <https://github.com/zephyrproject-rtos/zephyr/pull/47958>`_ 1143 1144- `PR 47959 fix for v2.7.0 1145 <https://github.com/zephyrproject-rtos/zephyr/pull/47959>`_ 1146 1147:cve:`2022-2993` 1148---------------- 1149 1150bt: host: Wrong key validation check 1151 1152This has been fixed in main for v3.2.0 1153 1154- `Zephyr project bug tracker GHSA-3286-jgjx-8cvr 1155 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3286-jgjx-8cvr>`_ 1156 1157- `PR 48733 fix for main 1158 <https://github.com/zephyrproject-rtos/zephyr/pull/48733>`_ 1159 1160:cve:`2022-3806` 1161---------------- 1162 1163DoS: Invalid Initialization in le_read_buffer_size_complete() 1164 1165- `Zephyr project bug tracker GHSA-w525-fm68-ppq3 1166 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w525-fm68-ppq3>`_ 1167 1168CVE-2023 1169======== 1170 1171:cve:`2023-0396` 1172---------------- 1173 1174Buffer Overreads in Bluetooth HCI 1175 1176- `Zephyr project bug tracker GHSA-8rpp-6vxq-pqg3 1177 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8rpp-6vxq-pqg3>`_ 1178 1179:cve:`2023-0397` 1180---------------- 1181 1182DoS: Invalid Initialization in le_read_buffer_size_complete() 1183 1184- `Zephyr project bug tracker GHSA-wc2h-h868-q7hj 1185 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wc2h-h868-q7hj>`_ 1186 1187This has been fixed in main for v3.3.0 1188 1189- `PR 54905 fix for main 1190 <https://github.com/zephyrproject-rtos/zephyr/pull/54905>`_ 1191 1192- `PR 47957 fix for v3.2.0 1193 <https://github.com/zephyrproject-rtos/zephyr/pull/55024>`_ 1194 1195- `PR 47958 fix for v3.1.0 1196 <https://github.com/zephyrproject-rtos/zephyr/pull/55023>`_ 1197 1198- `PR 47959 fix for v2.7.4 1199 <https://github.com/zephyrproject-rtos/zephyr/pull/55022>`_ 1200 1201:cve:`2023-0779` 1202---------------- 1203 1204net: shell: Improper input validation 1205 1206- `Zephyr project bug tracker GHSA-9xj8-6989-r549 1207 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549>`_ 1208 1209This has been fixed in main for v3.3.0 1210 1211- `PR 54371 fix for main 1212 <https://github.com/zephyrproject-rtos/zephyr/pull/54371>`_ 1213 1214- `PR 54380 fix for v3.2.0 1215 <https://github.com/zephyrproject-rtos/zephyr/pull/54380>`_ 1216 1217- `PR 54381 fix for v2.7.4 1218 <https://github.com/zephyrproject-rtos/zephyr/pull/54381>`_ 1219 1220:cve:`2023-1901` 1221---------------- 1222 1223HCI send_sync Dangling Semaphore Reference Re-use 1224 1225- `Zephyr project bug tracker GHSA-xvvm-8mcm-9cq3 1226 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xvvm-8mcm-9cq3>`_ 1227 1228This has been fixed in main for v3.4.0 1229 1230- `PR 56709 fix for main 1231 <https://github.com/zephyrproject-rtos/zephyr/pull/56709>`_ 1232 1233:cve:`2023-1902` 1234---------------- 1235 1236HCI Connection Creation Dangling State Reference Re-use 1237 1238- `Zephyr project bug tracker GHSA-fx9g-8fr2-q899 1239 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899>`_ 1240 1241This has been fixed in main for v3.4.0 1242 1243- `PR 56709 fix for main 1244 <https://github.com/zephyrproject-rtos/zephyr/pull/56709>`_ 1245 1246:cve:`2023-3725` 1247---------------- 1248 1249Potential buffer overflow vulnerability in the Zephyr CANbus subsystem. 1250 1251- `Zephyr project bug tracker GHSA-2g3m-p6c7-8rr3 1252 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3>`_ 1253 1254This has been fixed in main for v3.5.0 1255 1256- `PR 61502 fix for main 1257 <https://github.com/zephyrproject-rtos/zephyr/pull/61502>`_ 1258 1259- `PR 61518 fix for 3.4 1260 <https://github.com/zephyrproject-rtos/zephyr/pull/61518>`_ 1261 1262- `PR 61517 fix for 3.3 1263 <https://github.com/zephyrproject-rtos/zephyr/pull/61517>`_ 1264 1265- `PR 61516 fix for 2.7 1266 <https://github.com/zephyrproject-rtos/zephyr/pull/61516>`_ 1267 1268:cve:`2023-4257` 1269---------------- 1270 1271Unchecked user input length in the Zephyr WiFi shell module can cause 1272buffer overflows. 1273 1274- `Zephyr project bug tracker GHSA-853q-q69w-gf5j 1275 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-853q-q69w-gf5j>`_ 1276 1277This has been fixed in main for v3.5.0 1278 1279- `PR 605377 fix for main 1280 <https://github.com/zephyrproject-rtos/zephyr/pull/605377>`_ 1281 1282- `PR 61383 fix for 3.4 1283 <https://github.com/zephyrproject-rtos/zephyr/pull/61383>`_ 1284 1285:cve:`2023-4258` 1286---------------- 1287 1288bt: mesh: vulnerability in provisioning protocol implementation on provisionee side 1289 1290- `Zephyr project bug tracker GHSA-m34c-cp63-rwh7 1291 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m34c-cp63-rwh7>`_ 1292 1293This has been fixed in main for v3.5.0 1294 1295- `PR 59467 fix for main 1296 <https://github.com/zephyrproject-rtos/zephyr/pull/59467>`_ 1297 1298- `PR 60078 fix for 3.4 1299 <https://github.com/zephyrproject-rtos/zephyr/pull/60078>`_ 1300 1301- `PR 60079 fix for 3.3 1302 <https://github.com/zephyrproject-rtos/zephyr/pull/60079>`_ 1303 1304:cve:`2023-4259` 1305---------------- 1306 1307Buffer overflow vulnerabilities in the Zephyr eS-WiFi driver 1308 1309- `Zephyr project bug tracker GHSA-gghm-c696-f4j4 1310 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gghm-c696-f4j4>`_ 1311 1312This has been fixed in main for v3.5.0 1313 1314- `PR 63074 fix for main 1315 <https://github.com/zephyrproject-rtos/zephyr/pull/63074>`_ 1316 1317- `PR 63750 fix for main 1318 <https://github.com/zephyrproject-rtos/zephyr/pull/63750>`_ 1319 1320:cve:`2023-4260` 1321---------------- 1322 1323Off-by-one buffer overflow vulnerability in the Zephyr FS subsystem 1324 1325- `Zephyr project bug tracker GHSA-gj27-862r-55wh 1326 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gj27-862r-55wh>`_ 1327 1328This has been fixed in main for v3.5.0 1329 1330- `PR 63079 fix for main 1331 <https://github.com/zephyrproject-rtos/zephyr/pull/63079>`_ 1332 1333:cve:`2023-4262` 1334---------------- 1335 1336- This issue has been determined to be a false positive after further analysis. 1337 1338:cve:`2023-4263` 1339---------------- 1340 1341Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver. 1342 1343- `Zephyr project bug tracker GHSA-rf6q-rhhp-pqhf 1344 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rf6q-rhhp-pqhf>`_ 1345 1346This has been fixed in main for v3.5.0 1347 1348- `PR 60528 fix for main 1349 <https://github.com/zephyrproject-rtos/zephyr/pull/60528>`_ 1350 1351- `PR 61384 fix for 3.4 1352 <https://github.com/zephyrproject-rtos/zephyr/pull/61384>`_ 1353 1354- `PR 61216 fix for 2.7 1355 <https://github.com/zephyrproject-rtos/zephyr/pull/61216>`_ 1356 1357:cve:`2023-4264` 1358---------------- 1359 1360Potential buffer overflow vulnerabilities in the Zephyr Bluetooth subsystem 1361 1362- `Zephyr project bug tracker GHSA-rgx6-3w4j-gf5j 1363 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rgx6-3w4j-gf5j>`_ 1364 1365This has been fixed in main for v3.5.0 1366 1367- `PR 58834 fix for main 1368 <https://github.com/zephyrproject-rtos/zephyr/pull/58834>`_ 1369 1370- `PR 60465 fix for main 1371 <https://github.com/zephyrproject-rtos/zephyr/pull/60465>`_ 1372 1373- `PR 61845 fix for main 1374 <https://github.com/zephyrproject-rtos/zephyr/pull/61845>`_ 1375 1376- `PR 61385 fix for 3.4 1377 <https://github.com/zephyrproject-rtos/zephyr/pull/61385>`_ 1378 1379:cve:`2023-4265` 1380---------------- 1381 1382Two potential buffer overflow vulnerabilities in Zephyr USB code 1383 1384- `Zephyr project bug tracker GHSA-4vgv-5r6q-r6xh 1385 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-4vgv-5r6q-r6xh>`_ 1386 1387This has been fixed in main for v3.4.0 1388 1389- `PR 59157 fix for main 1390 <https://github.com/zephyrproject-rtos/zephyr/pull/59157>`_ 1391- `PR 59018 fix for main 1392 <https://github.com/zephyrproject-rtos/zephyr/pull/59018>`_ 1393 1394:cve:`2023-4424` 1395---------------- 1396 1397bt: hci: DoS and possible RCE 1398 1399- `Zephyr project bug tracker GHSA-j4qm-xgpf-qjw3 1400 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j4qm-xgpf-qjw3>`_ 1401 1402This has been fixed in main for v3.5.0 1403 1404- `PR 61651 fix for main 1405 <https://github.com/zephyrproject-rtos/zephyr/pull/61651>`_ 1406 1407- `PR 61696 fix for 3.4 1408 <https://github.com/zephyrproject-rtos/zephyr/pull/61696>`_ 1409 1410- `PR 61695 fix for 3.3 1411 <https://github.com/zephyrproject-rtos/zephyr/pull/61695>`_ 1412 1413- `PR 61694 fix for 2.7 1414 <https://github.com/zephyrproject-rtos/zephyr/pull/61694>`_ 1415 1416 1417:cve:`2023-5055` 1418---------------- 1419 1420L2CAP: Possible Stack based buffer overflow in le_ecred_reconf_req() 1421 1422- `Zephyr project bug tracker GHSA-wr8r-7f8x-24jj 1423 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wr8r-7f8x-24jj>`_ 1424 1425This has been fixed in main for v3.5.0 1426 1427- `PR 62381 fix for main 1428 <https://github.com/zephyrproject-rtos/zephyr/pull/62381>`_ 1429 1430 1431:cve:`2023-5139` 1432---------------- 1433 1434Potential buffer overflow vulnerability in the Zephyr STM32 Crypto driver. 1435 1436- `Zephyr project bug tracker GHSA-rhrc-pcxp-4453 1437 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453>`_ 1438 1439This has been fixed in main for v3.5.0 1440 1441- `PR 61839 fix for main 1442 <https://github.com/zephyrproject-rtos/zephyr/pull/61839>`_ 1443 1444:cve:`2023-5184` 1445---------------- 1446 1447Potential signed to unsigned conversion errors and buffer overflow 1448vulnerabilities in the Zephyr IPM driver 1449 1450- `Zephyr project bug tracker GHSA-8x3p-q3r5-xh9g 1451 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g>`_ 1452 1453This has been fixed in main for v3.5.0 1454 1455- `PR 63069 fix for main 1456 <https://github.com/zephyrproject-rtos/zephyr/pull/63069>`_ 1457 1458:cve:`2023-5563` 1459---------------- 1460 1461The SJA1000 CAN controller driver backend automatically attempts to recover 1462from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This 1463results in calling k_sleep() in IRQ context, causing a fatal exception. 1464 1465- `Zephyr project bug tracker GHSA-98mc-rj7w-7rpv 1466 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-98mc-rj7w-7rpv>`_ 1467 1468This has been fixed in main for v3.5.0 1469 1470- `PR 63713 fix for main 1471 <https://github.com/zephyrproject-rtos/zephyr/pull/63713>`_ 1472 1473- `PR 63718 fix for 3.4 1474 <https://github.com/zephyrproject-rtos/zephyr/pull/63718>`_ 1475 1476- `PR 63717 fix for 3.3 1477 <https://github.com/zephyrproject-rtos/zephyr/pull/63717>`_ 1478 1479:cve:`2023-5753` 1480---------------- 1481 1482Potential buffer overflow vulnerabilities in the Zephyr Bluetooth 1483subsystem source code when asserts are disabled. 1484 1485- `Zephyr project bug tracker GHSA-hmpr-px56-rvww 1486 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hmpr-px56-rvww>`_ 1487 1488This has been fixed in main for v3.5.0 1489 1490- `PR 63605 fix for main 1491 <https://github.com/zephyrproject-rtos/zephyr/pull/63605>`_ 1492 1493 1494:cve:`2023-5779` 1495---------------- 1496 1497Out of bounds issue in remove_rx_filter in multiple can drivers. 1498 1499- `Zephyr project bug tracker GHSA-7cmj-963q-jj47 1500 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47>`_ 1501 1502This has been fixed in main for v3.6.0 1503 1504- `PR 64399 fix for main 1505 <https://github.com/zephyrproject-rtos/zephyr/pull/64399>`_ 1506 1507- `PR 64416 fix for 3.5 1508 <https://github.com/zephyrproject-rtos/zephyr/pull/64416>`_ 1509 1510- `PR 64415 fix for 3.4 1511 <https://github.com/zephyrproject-rtos/zephyr/pull/64415>`_ 1512 1513- `PR 64427 fix for 3.3 1514 <https://github.com/zephyrproject-rtos/zephyr/pull/64427>`_ 1515 1516- `PR 64431 fix for 2.7 1517 <https://github.com/zephyrproject-rtos/zephyr/pull/64431>`_ 1518 1519:cve:`2023-6249` 1520---------------- 1521 1522Signed to unsigned conversion problem in esp32_ipm_send may lead to buffer overflow 1523 1524- `Zephyr project bug tracker GHSA-32f5-3p9h-2rqc 1525 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-32f5-3p9h-2rqc>`_ 1526 1527This has been fixed in main for v3.6.0 1528 1529- `PR 65546 fix for main 1530 <https://github.com/zephyrproject-rtos/zephyr/pull/65546>`_ 1531 1532:cve:`2023-6749` 1533---------------- 1534 1535Potential buffer overflow due unchecked data coming from user input in settings shell. 1536 1537- `Zephyr project bug tracker GHSA-757h-rw37-66hw 1538 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw>`_ 1539 1540This has been fixed in main for v3.6.0 1541 1542- `PR 66451 fix for main 1543 <https://github.com/zephyrproject-rtos/zephyr/pull/66451>`_ 1544 1545- `PR 66584 fix for 3.5 1546 <https://github.com/zephyrproject-rtos/zephyr/pull/66584>`_ 1547 1548:cve:`2023-6881` 1549---------------- 1550 1551Potential buffer overflow vulnerability in Zephyr fuse file system. 1552 1553- `Zephyr project bug tracker GHSA-mh67-4h3q-p437 1554 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437>`_ 1555 1556This has been fixed in main for v3.6.0 1557 1558- `PR 66592 fix for main 1559 <https://github.com/zephyrproject-rtos/zephyr/pull/66592>`_ 1560 1561:cve:`2023-7060` 1562---------------- 1563 1564Missing Security Control in Zephyr OS IP Packet Handling 1565 1566- `Zephyr project bug tracker GHSA-fjc8-223c-qgqr 1567 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr>`_ 1568 1569This has been fixed in main for v3.6.0 1570 1571- `PR 66645 fix for main 1572 <https://github.com/zephyrproject-rtos/zephyr/pull/66645>`_ 1573 1574- `PR 66739 fix for 3.5 1575 <https://github.com/zephyrproject-rtos/zephyr/pull/66739>`_ 1576 1577- `PR 66738 fix for 3.4 1578 <https://github.com/zephyrproject-rtos/zephyr/pull/66738>`_ 1579 1580- `PR 66887 fix for 2.7 1581 <https://github.com/zephyrproject-rtos/zephyr/pull/66887>`_ 1582 1583CVE-2024 1584======== 1585 1586:cve:`2024-1638` 1587---------------- 1588 1589Bluetooth characteristic LESC security requirement not enforced without additional flags 1590 1591- `Zephyr project bug tracker GHSA-p6f3-f63q-5mc2 1592 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p6f3-f63q-5mc2>`_ 1593 1594This has been fixed in main for v3.6.0 1595 1596- `PR 69170 fix for main 1597 <https://github.com/zephyrproject-rtos/zephyr/pull/69170>`_ 1598 1599:cve:`2024-3077` 1600---------------- 1601 1602Bluetooth: Integer underflow in gatt_find_info_rsp. A malicious BLE 1603device can crash BLE victim device by sending malformed gatt packet. 1604 1605- `Zephyr project bug tracker GHSA-gmfv-4vfh-2mh8 1606 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gmfv-4vfh-2mh8>`_ 1607 1608This has been fixed in main for v3.7.0 1609 1610- `PR 69396 fix for main 1611 <https://github.com/zephyrproject-rtos/zephyr/pull/69396>`_ 1612 1613:cve:`2024-3332` 1614---------------- 1615 1616Bluetooth: DoS caused by null pointer dereference. 1617 1618A malicious BLE device can send a specific order of packet 1619sequence to cause a DoS attack on the victim BLE device. 1620 1621- `Zephyr project bug tracker GHSA-jmr9-xw2v-5vf4 1622 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jmr9-xw2v-5vf4>`_ 1623 1624This has been fixed in main for v3.7.0 1625 1626- `PR 71030 fix for main 1627 <https://github.com/zephyrproject-rtos/zephyr/pull/71030>`_ 1628 1629 1630:cve:`2024-4785` 1631---------------- 1632 1633Bluetooth: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero 1634 1635- `Zephyr project bug tracker GHSA-xcr5-5g98-mchp 1636 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp>`_ 1637 1638This has been fixed in main for v3.7.0 1639 1640- `PR 72608 fix for main 1641 <https://github.com/zephyrproject-rtos/zephyr/pull/72608>`_ 1642 1643:cve:`2024-5754` 1644---------------- 1645 1646BT: Encryption procedure host vulnerability 1647 1648- `Zephyr project bug tracker GHSA-gvv5-66hw-5qrc 1649 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc>`_ 1650 1651This has been fixed in main for v3.7.0 1652 1653- `PR 7395 fix for main 1654 <https://github.com/zephyrproject-rtos/zephyr/pull/7395>`_ 1655 1656- `PR 74124 fix for 3.6 1657 <https://github.com/zephyrproject-rtos/zephyr/pull/74124>`_ 1658 1659- `PR 74123 fix for 3.5 1660 <https://github.com/zephyrproject-rtos/zephyr/pull/74123>`_ 1661 1662- `PR 74122 fix for 2.7 1663 <https://github.com/zephyrproject-rtos/zephyr/pull/74122>`_ 1664 1665:cve:`2024-5931` 1666---------------- 1667 1668BT: Unchecked user input in bap_broadcast_assistant 1669 1670- `Zephyr project bug tracker GHSA-r8h3-64gp-wv7f 1671 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r8h3-64gp-wv7f>`_ 1672 1673This has been fixed in main for v3.7.0 1674 1675- `PR 74062 fix for main 1676 <https://github.com/zephyrproject-rtos/zephyr/pull/74062>`_ 1677 1678- `PR 77966 fix for 3.6 1679 <https://github.com/zephyrproject-rtos/zephyr/pull/77966>`_ 1680 1681 1682:cve:`2024-6135` 1683---------------- 1684 1685BT:Classic: Multiple missing buf length checks 1686 1687- `Zephyr project bug tracker GHSA-2mp4-4g6f-cqcx 1688 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2mp4-4g6f-cqcx>`_ 1689 1690This has been fixed in main for v3.7.0 1691 1692- `PR 74283 fix for main 1693 <https://github.com/zephyrproject-rtos/zephyr/pull/74283>`_ 1694 1695- `PR 77964 fix for 3.6 1696 <https://github.com/zephyrproject-rtos/zephyr/pull/77964>`_ 1697 1698:cve:`2024-6137` 1699---------------- 1700 1701BT: Classic: SDP OOB access in get_att_search_list 1702 1703- `Zephyr project bug tracker GHSA-pm38-7g85-cf4f 1704 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-pm38-7g85-cf4f>`_ 1705 1706This has been fixed in main for v3.7.0 1707 1708- `PR 75575 fix for main 1709 <https://github.com/zephyrproject-rtos/zephyr/pull/75575>`_ 1710 1711:cve:`2024-6258` 1712---------------- 1713 1714BT: Missing length checks of net_buf in rfcomm_handle_data 1715 1716- `Zephyr project bug tracker GHSA-7833-fcpm-3ggm 1717 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7833-fcpm-3ggm>`_ 1718 1719This has been fixed in main for v3.7.0 1720 1721- `PR 74640 fix for main 1722 <https://github.com/zephyrproject-rtos/zephyr/pull/74640>`_ 1723 1724:cve:`2024-6259` 1725---------------- 1726 1727BT: HCI: adv_ext_report Improper discarding in adv_ext_report 1728 1729- `Zephyr project bug tracker GHSA-p5j7-v26w-wmcp 1730 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p5j7-v26w-wmcp>`_ 1731 1732This has been fixed in main for v3.7.0 1733 1734- `PR 74639 fix for main 1735 <https://github.com/zephyrproject-rtos/zephyr/pull/74639>`_ 1736 1737- `PR 77960 fix for 3.6 1738 <https://github.com/zephyrproject-rtos/zephyr/pull/77960>`_ 1739 1740:cve:`2024-6442` 1741---------------- 1742 1743Bluetooth: ASCS Unchecked tailroom of the response buffer 1744 1745- `Zephyr project bug tracker GHSA-m22j-ccg7-4v4h 1746 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-m22j-ccg7-4v4h>`_ 1747 1748This has been fixed in main for v3.7.0 1749 1750- `PR 74976 fix for main 1751 <https://github.com/zephyrproject-rtos/zephyr/pull/74976>`_ 1752 1753- `PR 77958 fix for 3.6 1754 <https://github.com/zephyrproject-rtos/zephyr/pull/77958>`_ 1755 1756:cve:`2024-6443` 1757---------------- 1758 1759zephyr: out-of-bound read in utf8_trunc 1760 1761- `Zephyr project bug tracker GHSA-gg46-3rh2-v765 1762 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gg46-3rh2-v765>`_ 1763 1764This has been fixed in main for v3.7.0 1765 1766- `PR 74949 fix for main 1767 <https://github.com/zephyrproject-rtos/zephyr/pull/74949>`_ 1768 1769- `PR 78286 fix for 3.6 1770 <https://github.com/zephyrproject-rtos/zephyr/pull/78286>`_ 1771 1772:cve:`2024-6444` 1773---------------- 1774 1775Bluetooth: ots: missing buffer length check 1776 1777- `Zephyr project bug tracker GHSA-qj4r-chj6-h7qp 1778 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qj4r-chj6-h7qp>`_ 1779 1780This has been fixed in main for v3.7.0 1781 1782- `PR 74944 fix for main 1783 <https://github.com/zephyrproject-rtos/zephyr/pull/74944>`_ 1784 1785- `PR 77954 fix for 3.6 1786 <https://github.com/zephyrproject-rtos/zephyr/pull/77954>`_ 1787 1788:cve:`2024-8798` 1789---------------- 1790 1791Bluetooth: classic: avdtp: missing buffer length check 1792 1793- `Zephyr project bug tracker GHSA-r7pm-f93f-f7fp 1794 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r7pm-f93f-f7fp>`_ 1795 1796This has been fixed in main for v4.0.0 1797 1798- `PR 77969 fix for main 1799 <https://github.com/zephyrproject-rtos/zephyr/pull/77969>`_ 1800 1801- `PR 78409 fix for 3.7 1802 <https://github.com/zephyrproject-rtos/zephyr/pull/78409>`_ 1803 1804:cve:`2024-10395` 1805----------------- 1806 1807Under embargo until 2025-01-23 1808 1809:cve:`2024-11263` 1810----------------- 1811 1812arch: riscv: userspace: potential security risk when CONFIG_RISCV_GP=y 1813 1814A rogue thread can corrupt the gp reg and cause the entire system to hard fault at best, at worst, 1815it can potentially trick the system to access another set of random global symbols. 1816 1817- `Zephyr project bug tracker GHSA-jjf3-7x72-pqm9 1818 <https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jjf3-7x72-pqm9>`_ 1819 1820This has been fixed in main for v4.0.0 1821 1822- `PR 81155 fix for main 1823 <https://github.com/zephyrproject-rtos/zephyr/pull/81155>`_ 1824 1825- `PR 81370 fix for 3.7 1826 <https://github.com/zephyrproject-rtos/zephyr/pull/81370>`_ 1827