Zephyrproject Zephyr 3.7.0 Release Candidate 3

CPE Details

Zephyrproject Zephyr 3.7.0 Release Candidate 3
3.7.0
2024-10-09
13h18 +00:00
2024-10-09
13h18 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:zephyrproject:zephyr:3.7.0:rc3:*:*:*:*:*:*

Informations

Vendor

zephyrproject

Product

zephyr

Version

3.7.0

Update

rc3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-1674 2025-02-25 07h18 +00:00 A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.
8.2
High
CVE-2025-1673 2025-02-25 07h12 +00:00 A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.
8.2
High
CVE-2024-8798 2024-12-15 23h23 +00:00 No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
7.5
High
CVE-2024-11263 2024-11-15 22h53 +00:00 When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.
9.4
Critical