@@ -360,15 +360,90 @@ This issue has not been fixed.
360
360
- `Zephyr project bug tracker ZEPSEC-37
361
361
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37> `_
362
362
363
+ CVE-2020-10061
364
+ --------------
365
+
366
+ Error handling invalid packet sequence
367
+
368
+ Improper handling of the full-buffer case in the Zephyr Bluetooth
369
+ implementation can result in memory corruption.
370
+
371
+ This has been fixed in branches for v1.14.0, v2.2.0, and will be
372
+ included in v2.3.0.
373
+
374
+ - `CVE-2020-10061 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10061 >`_
375
+
376
+ - `Zephyr project bug tracker ZEPSEC-75
377
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75> `_
378
+
379
+ - `PR23516 fix for v2.3 (split driver)
380
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23516> `_
381
+
382
+ - `PR23517 fix for v2.3 (legacy driver)
383
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23517> `_
384
+
385
+ - `PR23091 fix for branch from v1.14.0
386
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23091> `_
387
+
388
+ - `PR23547 fix for branch from v2.2.0
389
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23547> `_
390
+
363
391
CVE-2020-10062
364
392
--------------
365
393
366
- Under embargo until 2020/05/25
394
+ Packet length decoding error in MQTT
395
+
396
+ CVE: An off-by-one error in the Zephyr project MQTT packet length
397
+ decoder can result in memory corruption and possible remote code
398
+ execution. NCC-ZEP-031
399
+
400
+ The MQTT packet header length can be 1 to 4 bytes. An off-by-one error
401
+ in the code can result in this being interpreted as 5 bytes, which can
402
+ cause an integer overflow, resulting in memory corruption.
403
+
404
+ This has been fixed in master for v2.3.
405
+
406
+ - `CVE-2020-10062 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10062 >`_
407
+
408
+ - `Zephyr project bug tracker ZEPSEC-84
409
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84> `_
410
+
411
+ - `commit 11b7a37d for v2.3
412
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4> `_
413
+
414
+ - `NCC-ZEP report `_ (NCC-ZEP-031)
415
+
416
+ .. _NCC-ZEP report : https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
367
417
368
418
CVE-2020-10063
369
419
--------------
370
420
371
- Under embargo until 2020/05/25
421
+ Remote Denial of Service in CoAP Option Parsing Due To Integer
422
+ Overflow
423
+
424
+ A remote adversary with the ability to send arbitrary CoAP packets to
425
+ be parsed by Zephyr is able to cause a denial of service.
426
+
427
+ This has been fixed in master for v2.3.
428
+
429
+ - `CVE-2020-10063 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10063 >`_
430
+
431
+ - `Zephyr project bug tracker ZEPSEC-55
432
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55> `_
433
+
434
+ - `PR24435 fix in master for v2.3
435
+ <https://github.com/zephyrproject-rtos/zephyr/pull/24435> `_
436
+
437
+ - `PR24531 fix for branch from v2.2
438
+ <https://github.com/zephyrproject-rtos/zephyr/pull/24531> `_
439
+
440
+ - `PR24535 fix for branch from v2.1
441
+ <https://github.com/zephyrproject-rtos/zephyr/pull/24535> `_
442
+
443
+ - `PR24530 fix for branch from v1.14
444
+ <https://github.com/zephyrproject-rtos/zephyr/pull/24530> `_
445
+
446
+ - `NCC-ZEP report `_ (NCC-ZEP-032)
372
447
373
448
CVE-2020-10067
374
449
--------------
@@ -398,3 +473,105 @@ This has been fixed in releases v1.14.2, and v2.2.0.
398
473
399
474
- `PR23239 fix for v2.2.0
400
475
<https://github.com/zephyrproject-rtos/zephyr/pull/23239> `_
476
+
477
+ CVE-2020-10068
478
+ --------------
479
+
480
+ Zephyr Bluetooth DLE duplicate requests vulnerability
481
+
482
+ In the Zephyr project Bluetooth subsystem, certain duplicate and
483
+ back-to-back packets can cause incorrect behavior, resulting in a
484
+ denial of service.
485
+
486
+ This has been fixed in branches for v1.14.0, v2.2.0, and will be
487
+ included in v2.3.0.
488
+
489
+ - `CVE-2020-10068 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10068 >`_
490
+
491
+ - `Zephyr project bug tracker ZEPSEC-78
492
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78> `_
493
+
494
+ - `PR23707 fix for v2.3 (split driver)
495
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23707> `_
496
+
497
+ - `PR23708 fix for v2.3 (legacy driver)
498
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23708> `_
499
+
500
+ - `PR23091 fix for branch from v1.14.0
501
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23091> `_
502
+
503
+ - `PR23964 fix for v2.2.0
504
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23964> `_
505
+
506
+ CVE-2020-10069
507
+ --------------
508
+
509
+ Zephyr Bluetooth unchecked packet data results in denial of service
510
+
511
+ An unchecked parameter in bluetooth data can result in an assertion
512
+ failure, or division by zero, resulting in a denial of service attack.
513
+
514
+ This has been fixed in branches for v1.14.0, v2.2.0, and will be
515
+ included in v2.3.0.
516
+
517
+ - `CVE-2020-10069 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10069 >`_
518
+
519
+ - `Zephyr project bug tracker ZEPSEC-81
520
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81> `_
521
+
522
+ - `PR23705 fix for v2.3 (split driver)
523
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23705> `_
524
+
525
+ - `PR23706 fix for v2.3 (legacy driver)
526
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23706> `_
527
+
528
+ - `PR23091 fix for branch from v1.14.0
529
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23091> `_
530
+
531
+ - `PR23963 fix for branch from v2.2.0
532
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23963> `_
533
+
534
+ CVE-2020-10070
535
+ --------------
536
+
537
+ MQTT buffer overflow on receive buffer
538
+
539
+ In the Zephyr Project MQTT code, improper bounds checking can result
540
+ in memory corruption and possibly remote code execution. NCC-ZEP-031
541
+
542
+ When calculating the packet length, arithmetic overflow can result in
543
+ accepting a receive buffer larger than the available buffer space,
544
+ resulting in user data being written beyond this buffer.
545
+
546
+ This has been fixed in master for v2.3.
547
+
548
+ - `CVE-2020-10070 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10070 >`_
549
+
550
+ - `Zephyr project bug tracker ZEPSEC-85
551
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85> `_
552
+
553
+ - `commit 0b39cbf3 for v2.3
554
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542> `_
555
+
556
+ - `NCC-ZEP report `_ (NCC-ZEP-031)
557
+
558
+ CVE-2020-10071
559
+ --------------
560
+
561
+ Insufficient publish message length validation in MQTT
562
+
563
+ The Zephyr MQTT parsing code performs insufficient checking of the
564
+ length field on publish messages, allowing a buffer overflow and
565
+ potentially remote code execution. NCC-ZEP-031
566
+
567
+ This has been fixed in master for v2.3.
568
+
569
+ - `CVE-2020-10071 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10071 >`_
570
+
571
+ - `Zephyr project bug tracker ZEPSEC-86
572
+ <https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86> `_
573
+
574
+ - `commit 989c4713 fix for v2.3
575
+ <https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082> `_
576
+
577
+ - `NCC-ZEP report `_ (NCC-ZEP-031)
0 commit comments