Skip to content

Commit b32b5e1

Browse files
d3zd3zcarlescufi
authored andcommitted
doc: security: Release CVEs from embargo
These CVEs have been released from embargo. Include details in the v2.3 release notes, and in the vulnerabilities document. Signed-off-by: David Brown <[email protected]>
1 parent 37e50a6 commit b32b5e1

File tree

2 files changed

+192
-4
lines changed

2 files changed

+192
-4
lines changed

doc/releases/release-notes-2.3.rst

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,19 @@ The following CVEs are addressed by this release:
3434
into a fixed-size array.
3535
* CVE-2020-10059: UpdateHub Module Explicitly Disables TLS
3636
Verification
37-
* CVE-2020-10062: Under embargo until 2020/05/25
38-
* CVE-2020-10063: Under embargo until 2020/05/25
37+
* CVE-2020-10061: Improper handling of the full-buffer case in the
38+
Zephyr Bluetooth implementation can result in memory corruption.
39+
* CVE-2020-10062: Packet length decoding error in MQTT
40+
* CVE-2020-10063: Remote Denial of Service in CoAP Option Parsing Due
41+
To Integer Overflow
42+
* CVE-2020-10068: In the Zephyr project Bluetooth subsystem, certain
43+
duplicate and back-to-back packets can cause incorrect behavior,
44+
resulting in a denial of service.
45+
* CVE-2020-10069: An unchecked parameter in bluetooth data can result
46+
in an assertion failure, or division by zero, resulting in a denial
47+
of service attack.
48+
* CVE-2020-10070: MQTT buffer overflow on receive buffer
49+
* CVE-2020-10071: Insufficient publish message length validation in MQTT
3950

4051
More detailed information can be found in:
4152
https://docs.zephyrproject.org/latest/security/vulnerabilities.html

doc/security/vulnerabilities.rst

Lines changed: 179 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -360,15 +360,90 @@ This issue has not been fixed.
360360
- `Zephyr project bug tracker ZEPSEC-37
361361
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37>`_
362362

363+
CVE-2020-10061
364+
--------------
365+
366+
Error handling invalid packet sequence
367+
368+
Improper handling of the full-buffer case in the Zephyr Bluetooth
369+
implementation can result in memory corruption.
370+
371+
This has been fixed in branches for v1.14.0, v2.2.0, and will be
372+
included in v2.3.0.
373+
374+
- `CVE-2020-10061 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10061>`_
375+
376+
- `Zephyr project bug tracker ZEPSEC-75
377+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-75>`_
378+
379+
- `PR23516 fix for v2.3 (split driver)
380+
<https://github.com/zephyrproject-rtos/zephyr/pull/23516>`_
381+
382+
- `PR23517 fix for v2.3 (legacy driver)
383+
<https://github.com/zephyrproject-rtos/zephyr/pull/23517>`_
384+
385+
- `PR23091 fix for branch from v1.14.0
386+
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
387+
388+
- `PR23547 fix for branch from v2.2.0
389+
<https://github.com/zephyrproject-rtos/zephyr/pull/23547>`_
390+
363391
CVE-2020-10062
364392
--------------
365393

366-
Under embargo until 2020/05/25
394+
Packet length decoding error in MQTT
395+
396+
CVE: An off-by-one error in the Zephyr project MQTT packet length
397+
decoder can result in memory corruption and possible remote code
398+
execution. NCC-ZEP-031
399+
400+
The MQTT packet header length can be 1 to 4 bytes. An off-by-one error
401+
in the code can result in this being interpreted as 5 bytes, which can
402+
cause an integer overflow, resulting in memory corruption.
403+
404+
This has been fixed in master for v2.3.
405+
406+
- `CVE-2020-10062 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10062>`_
407+
408+
- `Zephyr project bug tracker ZEPSEC-84
409+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-84>`_
410+
411+
- `commit 11b7a37d for v2.3
412+
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/11b7a37d9a0b438270421b224221d91929843de4>`_
413+
414+
- `NCC-ZEP report`_ (NCC-ZEP-031)
415+
416+
.. _NCC-ZEP report: https://research.nccgroup.com/2020/05/26/research-report-zephyr-and-mcuboot-security-assessment
367417

368418
CVE-2020-10063
369419
--------------
370420

371-
Under embargo until 2020/05/25
421+
Remote Denial of Service in CoAP Option Parsing Due To Integer
422+
Overflow
423+
424+
A remote adversary with the ability to send arbitrary CoAP packets to
425+
be parsed by Zephyr is able to cause a denial of service.
426+
427+
This has been fixed in master for v2.3.
428+
429+
- `CVE-2020-10063 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10063>`_
430+
431+
- `Zephyr project bug tracker ZEPSEC-55
432+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-55>`_
433+
434+
- `PR24435 fix in master for v2.3
435+
<https://github.com/zephyrproject-rtos/zephyr/pull/24435>`_
436+
437+
- `PR24531 fix for branch from v2.2
438+
<https://github.com/zephyrproject-rtos/zephyr/pull/24531>`_
439+
440+
- `PR24535 fix for branch from v2.1
441+
<https://github.com/zephyrproject-rtos/zephyr/pull/24535>`_
442+
443+
- `PR24530 fix for branch from v1.14
444+
<https://github.com/zephyrproject-rtos/zephyr/pull/24530>`_
445+
446+
- `NCC-ZEP report`_ (NCC-ZEP-032)
372447

373448
CVE-2020-10067
374449
--------------
@@ -398,3 +473,105 @@ This has been fixed in releases v1.14.2, and v2.2.0.
398473

399474
- `PR23239 fix for v2.2.0
400475
<https://github.com/zephyrproject-rtos/zephyr/pull/23239>`_
476+
477+
CVE-2020-10068
478+
--------------
479+
480+
Zephyr Bluetooth DLE duplicate requests vulnerability
481+
482+
In the Zephyr project Bluetooth subsystem, certain duplicate and
483+
back-to-back packets can cause incorrect behavior, resulting in a
484+
denial of service.
485+
486+
This has been fixed in branches for v1.14.0, v2.2.0, and will be
487+
included in v2.3.0.
488+
489+
- `CVE-2020-10068 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10068>`_
490+
491+
- `Zephyr project bug tracker ZEPSEC-78
492+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-78>`_
493+
494+
- `PR23707 fix for v2.3 (split driver)
495+
<https://github.com/zephyrproject-rtos/zephyr/pull/23707>`_
496+
497+
- `PR23708 fix for v2.3 (legacy driver)
498+
<https://github.com/zephyrproject-rtos/zephyr/pull/23708>`_
499+
500+
- `PR23091 fix for branch from v1.14.0
501+
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
502+
503+
- `PR23964 fix for v2.2.0
504+
<https://github.com/zephyrproject-rtos/zephyr/pull/23964>`_
505+
506+
CVE-2020-10069
507+
--------------
508+
509+
Zephyr Bluetooth unchecked packet data results in denial of service
510+
511+
An unchecked parameter in bluetooth data can result in an assertion
512+
failure, or division by zero, resulting in a denial of service attack.
513+
514+
This has been fixed in branches for v1.14.0, v2.2.0, and will be
515+
included in v2.3.0.
516+
517+
- `CVE-2020-10069 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10069>`_
518+
519+
- `Zephyr project bug tracker ZEPSEC-81
520+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-81>`_
521+
522+
- `PR23705 fix for v2.3 (split driver)
523+
<https://github.com/zephyrproject-rtos/zephyr/pull/23705>`_
524+
525+
- `PR23706 fix for v2.3 (legacy driver)
526+
<https://github.com/zephyrproject-rtos/zephyr/pull/23706>`_
527+
528+
- `PR23091 fix for branch from v1.14.0
529+
<https://github.com/zephyrproject-rtos/zephyr/pull/23091>`_
530+
531+
- `PR23963 fix for branch from v2.2.0
532+
<https://github.com/zephyrproject-rtos/zephyr/pull/23963>`_
533+
534+
CVE-2020-10070
535+
--------------
536+
537+
MQTT buffer overflow on receive buffer
538+
539+
In the Zephyr Project MQTT code, improper bounds checking can result
540+
in memory corruption and possibly remote code execution. NCC-ZEP-031
541+
542+
When calculating the packet length, arithmetic overflow can result in
543+
accepting a receive buffer larger than the available buffer space,
544+
resulting in user data being written beyond this buffer.
545+
546+
This has been fixed in master for v2.3.
547+
548+
- `CVE-2020-10070 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10070>`_
549+
550+
- `Zephyr project bug tracker ZEPSEC-85
551+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-85>`_
552+
553+
- `commit 0b39cbf3 for v2.3
554+
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/0b39cbf3c01d7feec9d0dd7cc7e0e374b6113542>`_
555+
556+
- `NCC-ZEP report`_ (NCC-ZEP-031)
557+
558+
CVE-2020-10071
559+
--------------
560+
561+
Insufficient publish message length validation in MQTT
562+
563+
The Zephyr MQTT parsing code performs insufficient checking of the
564+
length field on publish messages, allowing a buffer overflow and
565+
potentially remote code execution. NCC-ZEP-031
566+
567+
This has been fixed in master for v2.3.
568+
569+
- `CVE-2020-10071 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10071>`_
570+
571+
- `Zephyr project bug tracker ZEPSEC-86
572+
<https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-86>`_
573+
574+
- `commit 989c4713 fix for v2.3
575+
<https://github.com/zephyrproject-rtos/zephyr/pull/23821/commits/989c4713ba429aa5105fe476b4d629718f3e6082>`_
576+
577+
- `NCC-ZEP report`_ (NCC-ZEP-031)

0 commit comments

Comments
 (0)