First published: Mon May 25 2020(Updated: )
In the Zephyr project Bluetooth subsystem, certain duplicate and back-to-back packets can cause incorrect behavior, resulting in a denial of service. This issue affects: zephyrproject-rtos zephyr version 2.2.0 and later versions, and version 1.14.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <1.14.0 | |
Zephyr Project Manager | >=2.0.0<2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10068 has been classified with a severity level that indicates it can lead to a denial of service.
To mitigate CVE-2020-10068, users should upgrade to a fixed version of the Zephyr project beyond 2.2.0.
CVE-2020-10068 affects Zephyr versions 1.14.0 and later, as well as versions from 2.0.0 to 2.2.0.
CVE-2020-10068 can cause systems to exhibit incorrect behavior due to processing duplicate and back-to-back Bluetooth packets.
Currently, there are no official workarounds for CVE-2020-10068; upgrading is the recommended resolution.