743 lines
22 KiB
ReStructuredText
743 lines
22 KiB
ReStructuredText
.. _vulnerabilities:
|
|
|
|
Vulnerabilities
|
|
###############
|
|
|
|
This page collects all of the vulnerabilities that are discovered and
|
|
fixed in each release. It will also often have more details than is
|
|
available in the releases. Some vulnerabilities are deemed to be
|
|
sensitive, and will not be publically discussed until there is
|
|
sufficient time to fix them. Because the release notes are locked to
|
|
a version, the information here can be updated after the embargo is
|
|
lifted.
|
|
|
|
CVE-2017
|
|
========
|
|
|
|
CVE-2017-14199
|
|
--------------
|
|
|
|
Buffer overflow in :code:`getaddrinfo()`.
|
|
|
|
- `CVE-2017-14199 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14199>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-12
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-12>`_
|
|
|
|
- `PR6158 fix for 1.11.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/6158>`_
|
|
|
|
CVE-2017-14201
|
|
--------------
|
|
|
|
The shell DNS command can cause unpredictable results due to misuse of
|
|
stack variables.
|
|
|
|
Use After Free vulnerability in the Zephyr shell allows a serial or
|
|
telnet connected user to cause denial of service, and possibly remote
|
|
code execution.
|
|
|
|
This has been fixed in release v1.14.0.
|
|
|
|
- `CVE-2017-14201 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14201>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-17
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-17>`_
|
|
|
|
- `PR13260 fix for v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/13260>`_
|
|
|
|
CVE-2017-14202
|
|
--------------
|
|
|
|
The shell implementation does not protect against buffer overruns
|
|
resulting in unpredicable behavior.
|
|
|
|
Improper Restriction of Operations within the Bounds of a Memory
|
|
Buffer vulnerability in the shell component of Zephyr allows a serial
|
|
or telnet connected user to cause a crash, possibly with arbitrary
|
|
code execution.
|
|
|
|
This has been fixed in release v1.14.0.
|
|
|
|
- `CVE-2017-14202 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14202>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-18
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-18>`_
|
|
|
|
- `PR13048 fix for v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/13048>`_
|
|
|
|
CVE-2019
|
|
========
|
|
|
|
CVE-2019-9506
|
|
-------------
|
|
|
|
The Bluetooth BR/EDR specification up to and including version 5.1
|
|
permits sufficiently low encryption key length and does not prevent an
|
|
attacker from influencing the key length negotiation. This allows
|
|
practical brute-force attacks (aka "KNOB") that can decrypt traffic
|
|
and inject arbitrary ciphertext without the victim noticing.
|
|
|
|
- `CVE-2019-9506 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-20
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-20>`_
|
|
|
|
- `PR18702 fix for v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/18702>`_
|
|
|
|
- `PR18659 fix for v2.0.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/18659>`_
|
|
|
|
CVE-2020
|
|
========
|
|
|
|
CVE-2020-10019
|
|
--------------
|
|
|
|
Buffer Overflow vulnerability in USB DFU of zephyr allows a USB
|
|
connected host to cause possible remote code execution.
|
|
|
|
This has been fixed in releases v1.14.2, v2.2.0, and v2.1.1.
|
|
|
|
- `CVE-2020-10019 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10019>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-25
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25>`_
|
|
|
|
- `PR23460 fix for 1.14.x
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23460>`_
|
|
|
|
- `PR23457 fix for 2.1.x
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23457>`_
|
|
|
|
- `PR23190 fix in 2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23190>`_
|
|
|
|
CVE-2020-10021
|
|
--------------
|
|
|
|
Out-of-bounds write in USB Mass Storage with unaligned sizes
|
|
|
|
Out-of-bounds Write in the USB Mass Storage memoryWrite handler with
|
|
unaligned Sizes.
|
|
|
|
See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026
|
|
|
|
This has been fixed in releases v1.14.2, and v2.2.0.
|
|
|
|
- `CVE-2020-10021 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10021>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-26
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26>`_
|
|
|
|
- `PR23455 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23455>`_
|
|
|
|
- `PR23456 fix for the v2.1 branch
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23456>`_
|
|
|
|
- `PR23240 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23240>`_
|
|
|
|
CVE-2020-10022
|
|
--------------
|
|
|
|
UpdateHub Module Copies a Variable-Size Hash String Into a Fixed-Size Array
|
|
|
|
A malformed JSON payload that is received from an UpdateHub server may
|
|
trigger memory corruption in the Zephyr OS. This could result in a
|
|
denial of service in the best case, or code execution in the worst
|
|
case.
|
|
|
|
See NCC-ZEP-016
|
|
|
|
This has been fixed in the below pull requests for master, branch from
|
|
v2.1.0, and branch from v2.2.0.
|
|
|
|
- `CVE-2020-10022 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10022>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-28
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28>`_
|
|
|
|
- `PR24154 fix for master
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24154>`_
|
|
|
|
- `PR24065 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24065>`_
|
|
|
|
- `PR24066 fix for branch from v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24066>`_
|
|
|
|
CVE-2020-10023
|
|
--------------
|
|
|
|
Shell Subsystem Contains a Buffer Overflow Vulnerability In
|
|
shell_spaces_trim
|
|
|
|
The shell subsystem contains a buffer overflow, whereby an adversary
|
|
with physical access to the device is able to cause a memory
|
|
corruption, resulting in denial of service or possibly code execution
|
|
within the Zephyr kernel.
|
|
|
|
See NCC-ZEP-019
|
|
|
|
This has been fixed in releases v1.14.2, v2.2.0, and in a branch from
|
|
v2.1.0,
|
|
|
|
- `CVE-2020-10023 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10023>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-29
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29>`_
|
|
|
|
- `PR23646 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23646>`_
|
|
|
|
- `PR23649 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23649>`_
|
|
|
|
- `PR23304 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23304>`_
|
|
|
|
CVE-2020-10024
|
|
--------------
|
|
|
|
ARM Platform Uses Signed Integer Comparison When Validating Syscall
|
|
Numbers
|
|
|
|
The arm platform-specific code uses a signed integer comparison when
|
|
validating system call numbers. An attacker who has obtained code
|
|
execution within a user thread is able to elevate privileges to that
|
|
of the kernel.
|
|
|
|
See NCC-ZEP-001
|
|
|
|
This has been fixed in releases v1.14.2, and v2.2.0, and in a branch
|
|
from v2.1.0,
|
|
|
|
- `CVE-2020-10024 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10024>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-30
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30>`_
|
|
|
|
- `PR23535 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23535>`_
|
|
|
|
- `PR23498 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23498>`_
|
|
|
|
- `PR23323 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23323>`_
|
|
|
|
CVE-2020-10027
|
|
--------------
|
|
|
|
ARC Platform Uses Signed Integer Comparison When Validating Syscall
|
|
Numbers
|
|
|
|
An attacker who has obtained code execution within a user thread is
|
|
able to elevate privileges to that of the kernel.
|
|
|
|
See NCC-ZEP-001
|
|
|
|
This has been fixed in releases v1.14.2, and v2.2.0, and in a branch
|
|
from v2.1.0.
|
|
|
|
- `CVE-2020-10027 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10027>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-35
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35>`_
|
|
|
|
- `PR23500 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23500>`_
|
|
|
|
- `PR23499 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23499>`_
|
|
|
|
- `PR23328 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23328>`_
|
|
|
|
CVE-2020-10028
|
|
--------------
|
|
|
|
Multiple Syscalls In GPIO Subsystem Performs No Argument Validation
|
|
|
|
Multiple syscalls with insufficient argument validation
|
|
|
|
See NCC-ZEP-006
|
|
|
|
This has been fixed in releases v1.14.2, and v2.2.0, and in a branch
|
|
from v2.1.0.
|
|
|
|
- `CVE-2020-10028 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10028>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-32
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32>`_
|
|
|
|
- `PR23733 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23733>`_
|
|
|
|
- `PR23737 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23737>`_
|
|
|
|
- `PR23308 fix for v2.2.0 (gpio patch)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_
|
|
|
|
CVE-2020-10058
|
|
--------------
|
|
|
|
Multiple Syscalls In kscan Subsystem Performs No Argument Validation
|
|
|
|
Multiple syscalls in the Kscan subsystem perform insufficient argument
|
|
validation, allowing code executing in userspace to potentially gain
|
|
elevated privileges.
|
|
|
|
See NCC-ZEP-006
|
|
|
|
This has been fixed in a branch from v2.1.0, and release v2.2.0.
|
|
|
|
- `CVE-2020-10058 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10058>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-34
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34>`_
|
|
|
|
- `PR23748 fix for branch from v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23748>`_
|
|
|
|
- `PR23308 fix for v2.2.0 (kscan patch)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23308>`_
|
|
|
|
CVE-2020-10059
|
|
--------------
|
|
|
|
UpdateHub Module Explicitly Disables TLS Verification
|
|
|
|
The UpdateHub module disables DTLS peer checking, which allows for a
|
|
man in the middle attack. This is mitigated by firmware images
|
|
requiring valid signatures. However, there is no benefit to using DTLS
|
|
without the peer checking.
|
|
|
|
See NCC-ZEP-018
|
|
|
|
This has been fixed in a PR against Zephyr master.
|
|
|
|
- `CVE-2020-10059 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10059>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-36
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36>`_
|
|
|
|
- `PR24954 fix on master (to be fixed in v2.3.0)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24954>`_
|
|
|
|
- `PR24954 fix v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24999>`_
|
|
|
|
- `PR24954 fix v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24997>`_
|
|
|
|
CVE-2020-10060
|
|
--------------
|
|
|
|
UpdateHub Might Dereference An Uninitialized Pointer
|
|
|
|
In updatehub_probe, right after JSON parsing is complete, objects\[1]
|
|
is accessed from the output structure in two different places. If the
|
|
JSON contained less than two elements, this access would reference
|
|
unitialized stack memory. This could result in a crash, denial of
|
|
service, or possibly an information leak.
|
|
|
|
Recommend disabling updatehub until such a time as a fix can be made
|
|
available.
|
|
|
|
See NCC-ZEP-030
|
|
|
|
This has been fixed in a PR against Zephyr master.
|
|
|
|
- `CVE-2020-10060 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10060>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-37
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_
|
|
|
|
- `PR27865 fix on master (to be fixed in v2.4.0)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/27865>`_
|
|
|
|
- `PR27865 fix for v2.3.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/27889>`_
|
|
|
|
- `PR27865 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/27891>`_
|
|
|
|
- `PR27865 fix for v2.1.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/27893>`_
|
|
|
|
CVE-2020-10061
|
|
--------------
|
|
|
|
Error handling invalid packet sequence
|
|
|
|
Improper handling of the full-buffer case in the Zephyr Bluetooth
|
|
implementation can result in memory corruption.
|
|
|
|
This has been fixed in branches for v1.14.0, v2.2.0, and will be
|
|
included in v2.3.0.
|
|
|
|
- `CVE-2020-10061 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10061>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-75
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75>`_
|
|
|
|
- `PR23516 fix for v2.3 (split driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23516>`_
|
|
|
|
- `PR23517 fix for v2.3 (legacy driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23517>`_
|
|
|
|
- `PR23091 fix for branch from v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
|
|
|
|
- `PR23547 fix for branch from v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23547>`_
|
|
|
|
CVE-2020-10062
|
|
--------------
|
|
|
|
Packet length decoding error in MQTT
|
|
|
|
CVE: An off-by-one error in the Zephyr project MQTT packet length
|
|
decoder can result in memory corruption and possible remote code
|
|
execution. NCC-ZEP-031
|
|
|
|
The MQTT packet header length can be 1 to 4 bytes. An off-by-one error
|
|
in the code can result in this being interpreted as 5 bytes, which can
|
|
cause an integer overflow, resulting in memory corruption.
|
|
|
|
This has been fixed in master for v2.3.
|
|
|
|
- `CVE-2020-10062 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10062>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-84
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84>`_
|
|
|
|
- `commit 11b7a37d for v2.3
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4>`_
|
|
|
|
- `NCC-ZEP report`_ (NCC-ZEP-031)
|
|
|
|
.. _NCC-ZEP report: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
|
|
|
|
CVE-2020-10063
|
|
--------------
|
|
|
|
Remote Denial of Service in CoAP Option Parsing Due To Integer
|
|
Overflow
|
|
|
|
A remote adversary with the ability to send arbitrary CoAP packets to
|
|
be parsed by Zephyr is able to cause a denial of service.
|
|
|
|
This has been fixed in master for v2.3.
|
|
|
|
- `CVE-2020-10063 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10063>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-55
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55>`_
|
|
|
|
- `PR24435 fix in master for v2.3
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24435>`_
|
|
|
|
- `PR24531 fix for branch from v2.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24531>`_
|
|
|
|
- `PR24535 fix for branch from v2.1
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24535>`_
|
|
|
|
- `PR24530 fix for branch from v1.14
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24530>`_
|
|
|
|
- `NCC-ZEP report`_ (NCC-ZEP-032)
|
|
|
|
CVE-2020-10064
|
|
--------------
|
|
|
|
Improper Input Frame Validation in ieee802154 Processing
|
|
|
|
- `CVE-2020-10064 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10064>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-65
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-65>`_
|
|
|
|
- `PR24971 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24971>`_
|
|
|
|
CVE-2020-10066
|
|
--------------
|
|
|
|
Incorrect Error Handling in Bluetooth HCI core
|
|
|
|
In hci_cmd_done, the buf argument being passed as null causes
|
|
nullpointer dereference.
|
|
|
|
- `CVE-2020-10066 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10066>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-67
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-67>`_
|
|
|
|
- `PR24902 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/24902>`_
|
|
|
|
CVE-2020-10067
|
|
--------------
|
|
|
|
Integer Overflow In is_in_region Allows User Thread To Access Kernel Memory
|
|
|
|
A malicious userspace application can cause a integer overflow and
|
|
bypass security checks performed by system call handlers. The impact
|
|
would depend on the underlying system call and can range from denial
|
|
of service to information leak to memory corruption resulting in code
|
|
execution within the kernel.
|
|
|
|
See NCC-ZEP-005
|
|
|
|
This has been fixed in releases v1.14.2, and v2.2.0.
|
|
|
|
- `CVE-2020-10067 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10067>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-27
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27>`_
|
|
|
|
- `PR23653 fix for v1.14.2
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23653>`_
|
|
|
|
- `PR23654 fix for the v2.1 branch
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23654>`_
|
|
|
|
- `PR23239 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_
|
|
|
|
CVE-2020-10068
|
|
--------------
|
|
|
|
Zephyr Bluetooth DLE duplicate requests vulnerability
|
|
|
|
In the Zephyr project Bluetooth subsystem, certain duplicate and
|
|
back-to-back packets can cause incorrect behavior, resulting in a
|
|
denial of service.
|
|
|
|
This has been fixed in branches for v1.14.0, v2.2.0, and will be
|
|
included in v2.3.0.
|
|
|
|
- `CVE-2020-10068 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10068>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-78
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78>`_
|
|
|
|
- `PR23707 fix for v2.3 (split driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23707>`_
|
|
|
|
- `PR23708 fix for v2.3 (legacy driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23708>`_
|
|
|
|
- `PR23091 fix for branch from v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
|
|
|
|
- `PR23964 fix for v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23964>`_
|
|
|
|
CVE-2020-10069
|
|
--------------
|
|
|
|
Zephyr Bluetooth unchecked packet data results in denial of service
|
|
|
|
An unchecked parameter in bluetooth data can result in an assertion
|
|
failure, or division by zero, resulting in a denial of service attack.
|
|
|
|
This has been fixed in branches for v1.14.0, v2.2.0, and will be
|
|
included in v2.3.0.
|
|
|
|
- `CVE-2020-10069 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10069>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-81
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81>`_
|
|
|
|
- `PR23705 fix for v2.3 (split driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23705>`_
|
|
|
|
- `PR23706 fix for v2.3 (legacy driver)
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23706>`_
|
|
|
|
- `PR23091 fix for branch from v1.14.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
|
|
|
|
- `PR23963 fix for branch from v2.2.0
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23963>`_
|
|
|
|
CVE-2020-10070
|
|
--------------
|
|
|
|
MQTT buffer overflow on receive buffer
|
|
|
|
In the Zephyr Project MQTT code, improper bounds checking can result
|
|
in memory corruption and possibly remote code execution. NCC-ZEP-031
|
|
|
|
When calculating the packet length, arithmetic overflow can result in
|
|
accepting a receive buffer larger than the available buffer space,
|
|
resulting in user data being written beyond this buffer.
|
|
|
|
This has been fixed in master for v2.3.
|
|
|
|
- `CVE-2020-10070 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10070>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-85
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85>`_
|
|
|
|
- `commit 0b39cbf3 for v2.3
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542>`_
|
|
|
|
- `NCC-ZEP report`_ (NCC-ZEP-031)
|
|
|
|
CVE-2020-10071
|
|
--------------
|
|
|
|
Insufficient publish message length validation in MQTT
|
|
|
|
The Zephyr MQTT parsing code performs insufficient checking of the
|
|
length field on publish messages, allowing a buffer overflow and
|
|
potentially remote code execution. NCC-ZEP-031
|
|
|
|
This has been fixed in master for v2.3.
|
|
|
|
- `CVE-2020-10071 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10071>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-86
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86>`_
|
|
|
|
- `commit 989c4713 fix for v2.3
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082>`_
|
|
|
|
- `NCC-ZEP report`_ (NCC-ZEP-031)
|
|
|
|
CVE-2020-10072
|
|
--------------
|
|
|
|
All threads can access all socket file descriptors
|
|
|
|
There is no management of permissions to network socket API file
|
|
descriptors. Any thread running on the system may read/write a socket
|
|
file descriptor knowing only the numerical value of the file
|
|
descriptor.
|
|
|
|
- `CVE-2020-10072 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10072>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-87
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-87>`_
|
|
|
|
- `PR25804 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/25804>`_
|
|
|
|
CVE-2020-10136
|
|
-------------------
|
|
|
|
IP-in-IP protocol routes arbitrary traffic by default zephyrproject
|
|
|
|
- `CVE-2020-10136 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10136>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-64
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-64>`_
|
|
|
|
CVE-2020-13598
|
|
--------------
|
|
|
|
FS: Buffer Overflow when enabling Long File Names in FAT_FS and calling fs_stat
|
|
|
|
Performing fs_stat on a file with a filename longer than 12
|
|
characters long will cause a buffer overflow.
|
|
|
|
- `CVE-2020-13598 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13598>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-88
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-88>`_
|
|
|
|
- `PR25852 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/25852>`_
|
|
|
|
CVE-2020-13599
|
|
--------------
|
|
|
|
Security problem with settings and littlefs
|
|
|
|
When settings is used in combination with littlefs all security
|
|
related information can be extracted from the device using MCUmgr and
|
|
this could be used e.g in bt-mesh to get the device key, network key,
|
|
app keys from the device.
|
|
|
|
- `CVE-2020-13599 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13599>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-57
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-57>`_
|
|
|
|
- `PR26083 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/26083>`_
|
|
|
|
CVE-2020-13600
|
|
-------------------
|
|
|
|
Malformed SPI in response for eswifi can corrupt kernel memory
|
|
|
|
|
|
- `CVE-2020-13600 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13600>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-91
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-91>`_
|
|
|
|
- `PR26712 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/26712>`_
|
|
|
|
CVE-2020-13601
|
|
--------------
|
|
|
|
Possible read out of bounds in dns read
|
|
|
|
- `CVE-2020-13601 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13601>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-92
|
|
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-92>`_
|
|
|
|
- `PR27774 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/27774>`_
|
|
|
|
CVE-2020-13602
|
|
--------------
|
|
|
|
Remote Denial of Service in LwM2M do_write_op_tlv
|
|
|
|
In the Zephyr LwM2M implementation, malformed input can result in an
|
|
infinite loop, resulting in a denial of service attack.
|
|
|
|
- `CVE-2020-13602 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13602>`_
|
|
|
|
- `Zephyr project bug tracker ZEPSEC-56
|
|
<https://zephyrprojectsec.atlasssian.net/browse/ZEPSEC-56>`_
|
|
|
|
- `PR26571 fix for v2.4
|
|
<https://github.com/zephyrproject-rtos/zephyr/pull/26571>`_
|
|
|
|
|
|
CVE-2021
|
|
========
|
|
|
|
CVE-2021-3320
|
|
-------------------
|
|
|
|
Under embargo until 2021-04-14
|
|
|
|
CVE-2021-3321
|
|
-------------------
|
|
|
|
Under embargo until 2021-04-14
|
|
|
|
CVE-2021-3323
|
|
-------------------
|
|
|
|
Under embargo until 2021-04-14
|