Zephyrproject Zephyr 3.5.0 Release Candidate 2

CPE Details

Zephyrproject Zephyr 3.5.0 Release Candidate 2
3.5.0
2025-01-28
16h17 +00:00
2025-01-28
16h17 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:zephyrproject:zephyr:3.5.0:rc2:*:*:*:*:*:*

Informations

Vendor

zephyrproject

Product

zephyr

Version

3.5.0

Update

rc2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-1674 2025-02-25 07h18 +00:00 A lack of input validation allows for out of bounds reads caused by malicious or malformed packets.
8.2
Haute
CVE-2025-1673 2025-02-25 07h12 +00:00 A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation.
8.2
Haute
CVE-2024-8798 2024-12-15 23h23 +00:00 No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
7.5
Haute
CVE-2024-11263 2024-11-15 22h53 +00:00 When the Global Pointer (GP) relative addressing is enabled (CONFIG_RISCV_GP=y), the gp reg points at 0x800 bytes past the start of the .sdata section which is then used by the linker to relax accesses to global symbols.
9.4
Critique
CVE-2024-6444 2024-10-04 06h14 +00:00 No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
6.5
Moyen
CVE-2024-6443 2024-10-04 05h56 +00:00 In utf8_trunc in zephyr/lib/utils/utf8.c, last_byte_p can point to one byte before the string pointer if the string is empty.
6.5
Moyen
CVE-2024-6442 2024-10-04 05h36 +00:00 In ascs_cp_rsp_add in /subsys/bluetooth/audio/ascs.c, an unchecked tailroom could lead to a global buffer overflow.
6.5
Moyen
CVE-2024-6259 2024-09-13 20h17 +00:00 BT: HCI: adv_ext_report Improper discarding in adv_ext_report
7.6
Haute
CVE-2024-6137 2024-09-13 20h06 +00:00 BT: Classic: SDP OOB access in get_att_search_list
7.6
Haute
CVE-2024-6135 2024-09-13 19h51 +00:00 BT:Classic: Multiple missing buf length checks
7.6
Haute
CVE-2024-5931 2024-09-13 19h41 +00:00 BT: Unchecked user input in bap_broadcast_assistant
6.5
Moyen
CVE-2024-6258 2024-09-13 19h05 +00:00 BT: Missing length checks of net_buf in rfcomm_handle_data
6.8
Moyen
CVE-2024-5754 2024-09-13 18h50 +00:00 BT: Encryption procedure host vulnerability
8.2
Haute
CVE-2024-4785 2024-08-19 20h15 +00:00 BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero
7.6
Haute
CVE-2024-3332 2024-07-03 16h44 +00:00 A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device
6.5
Moyen
CVE-2024-3077 2024-03-29 05h06 +00:00 An malicious BLE device can crash BLE victim device by sending malformed gatt packet
6.8
Moyen
CVE-2023-7060 2024-03-15 18h12 +00:00 Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address.
8.6
Haute
CVE-2023-6881 2024-02-20 18h25 +00:00 Possible buffer overflow in is_mount_point
9.8
Critique
CVE-2024-1638 2024-02-19 21h19 +00:00 The documentation specifies that the BT_GATT_PERM_READ_LESC and BT_GATT_PERM_WRITE_LESC defines for a Bluetooth characteristic: Attribute read/write permission with LE Secure Connection encryption. If set, requires that LE Secure Connections is used for read/write access, however this is only true when it is combined with other permissions, namely BT_GATT_PERM_READ_ENCRYPT/BT_GATT_PERM_READ_AUTHEN (for read) or BT_GATT_PERM_WRITE_ENCRYPT/BT_GATT_PERM_WRITE_AUTHEN (for write), if these additional permissions are not set (even in secure connections only mode) then the stack does not perform any permission checks on these characteristics and they can be freely written/read.
9.1
Critique
CVE-2023-5779 2024-02-18 07h46 +00:00 can: out of bounds in remove_rx_filter function
9.8
Critique
CVE-2023-6249 2024-02-18 07h27 +00:00 Signed to unsigned conversion esp32_ipm_send
9.8
Critique
CVE-2023-6749 2024-02-18 07h04 +00:00 Unchecked length coming from user input in settings shell
9.8
Critique