VYPR

Zephyr

by Zephyrproject Rtos

Source repositories

CVEs (115)

CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2023-51390.000.00Oct 26, 2023Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver
CVE-2023-57530.000.00Oct 24, 2023Potential buffer overflows in the Bluetooth subsystem due to asserts being disabled in /subsys/bluetooth/host/hci_core.c
CVE-2023-42570.000.00Oct 13, 2023Unchecked user input length in /subsys/net/l2/wifi/wifi_shell.c can cause buffer overflows.
CVE-2023-42630.000.00Oct 13, 2023Potential buffer overflow vulnerability in the Zephyr IEEE 802.15.4 nRF 15.4 driver
CVE-2023-55630.000.00Oct 12, 2023The SJA1000 CAN controller driver backend automatically attempt to recover from a bus-off event when built with CONFIG_CAN_AUTO_BUS_OFF_RECOVERY=y. This results in calling k_sleep() in IRQ context, causing a fatal exception.
CVE-2023-37250.000.01Oct 6, 2023Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem
CVE-2023-51840.000.00Sep 27, 2023Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
CVE-2023-42600.000.00Sep 26, 2023Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.
CVE-2023-42640.000.00Sep 26, 2023Potential buffer overflow vulnerabilities n the Zephyr Bluetooth subsystem.
CVE-2023-42590.000.00Sep 25, 2023Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.
CVE-2023-42580.000.00Sep 25, 2023In Bluetooth mesh implementation If provisionee has a public key that is sent OOB then during provisioning it can be sent back and will be accepted by provisionee.
CVE-2023-42650.000.00Aug 12, 2023Potential buffer overflow vulnerabilities in the following locations: https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/drivers/usb/device/usb_dc_native_posix.c#L359 https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis... https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/usb/device/class/netusb/function_rndis.c#L841
CVE-2023-19010.000.00Jul 10, 2023The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
CVE-2023-22340.000.00Jul 10, 2023Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host.
CVE-2023-19020.000.00Jul 10, 2023The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
CVE-2023-03590.000.00Jul 10, 2023A missing nullptr-check in handle_ra_input can cause a nullptr-deref.
CVE-2023-07790.000.00May 30, 2023At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
CVE-2021-33290.000.00Feb 26, 2023Lack of proper validation in HCI Host stack initialization can cause a crash of the bluetooth stack
CVE-2023-03970.000.00Jan 19, 2023A malicious / defect bluetooth controller can cause a Denial of Service due to unchecked input in le_read_buffer_size_complete.
CVE-2022-38060.000.00Jan 19, 2023Inconsistent handling of error cases in bluetooth hci may lead to a double free condition of a network buffer.

Page 3 of 6