Home

Description

There is a potential OOB Write vulnerability in the gen_prov_start function in pb_adv.c. The full length of the received data is copied into the link.rx.buf receiver buffer without any validation on the data size.

PUBLISHED Reserved 2025-08-27 | Published 2025-11-26 | Updated 2025-11-26 | Assigner zephyr




HIGH: 7.6CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Problem types

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

* (git)
affected

References

github.com/...zephyr/security/advisories/GHSA-8wvr-688x-68vr

cve.org (CVE-2025-9558)

nvd.nist.gov (CVE-2025-9558)

Download JSON