Home
LOW: 3.8 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:LDefault status
unaffected
* (git)
affected
Description
Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.
Problem types
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Product status
* (git)
References
github.com/...zephyr/security/advisories/GHSA-ff4p-3ggg-prp6
github.com/...zephyr/security/advisories/GHSA-ff4p-3ggg-prp6