CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
A lack of input validation allows for out of bounds reads caused by malicious or malformed packets. | 8.2 |
High |
||
A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation. | 8.2 |
High |
||
No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c. | 7.5 |
High |
||
When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols. | 9.4 |
Critical |